Vulnerabilites related to huawei - smc2.0
CVE-2020-9209 (GCVE-0-2020-9209)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | SMC2.0 |
Version: V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.057Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "SMC2.0", vendor: "n/a", versions: [ { status: "affected", version: "V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10", }, ], }, ], descriptions: [ { lang: "en", value: "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.", }, ], problemTypes: [ { descriptions: [ { description: "Privilege Escalation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T22:04:37", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9209", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "SMC2.0", version: { version_data: [ { version_value: "V600R006C00SPC700,V600R006C00SPC800,V600R006C10SPC500,V600R006C10SPC600,V600R006C10SPC601,V600R006C10SPC602,V600R006C10SPC700,V600R006C10SPC800,V600R006C10SPCa00,V600R006C10SPCb00,V600R006C10SPCc00,V600R006C10SPCd00,V600R006C10SPCe00,V600R019C00,V600R019C10", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Privilege Escalation", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9209", datePublished: "2021-01-13T22:04:37", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.057Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19416 (GCVE-0-2019-19416)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.115Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:55:48", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19416", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19416", datePublished: "2020-07-08T16:55:48", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.115Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15331 (GCVE-0-2017-15331)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.586Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]", }, ], }, ], datePublic: "2017-11-29T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15331", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15331", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.586Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15332 (GCVE-0-2017-15332)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.527Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]", }, ], }, ], datePublic: "2017-11-29T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15332", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15332", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.527Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-8213 (GCVE-0-2017-8213)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | SMC2.0 |
Version: V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00, |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:27:23.238Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "SMC2.0", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00,", }, ], }, ], datePublic: "2017-11-15T00:00:00", descriptions: [ { lang: "en", value: "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module.", }, ], problemTypes: [ { descriptions: [ { description: "input validation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-27T16:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-11-15T00:00:00", ID: "CVE-2017-8213", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C10,V100R005C00SPC100,V100R005C00SPC101B001T,V100R005C00SPC102,V100R005C00SPC103,V100R005C00SPC200,V100R005C00SPC201T,V500R002C00,V600R006C00,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "input validation", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-8213", datePublished: "2017-11-22T19:00:00Z", dateReserved: "2017-04-25T00:00:00", dateUpdated: "2024-09-16T17:54:04.082Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-0708 (GCVE-0-2019-0708)
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows |
Version: 7 for 32-bit Systems Service Pack 1 Version: 7 for x64-based Systems Service Pack 1 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:51:27.186Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2019-0708", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-07T16:17:22.676231Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2021-11-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-0708", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-07T16:28:16.043Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Windows", vendor: "Microsoft", versions: [ { status: "affected", version: "7 for 32-bit Systems Service Pack 1", }, { status: "affected", version: "7 for x64-based Systems Service Pack 1", }, ], }, { product: "Windows Server", vendor: "Microsoft", versions: [ { status: "affected", version: "2008 R2 for x64-based Systems Service Pack 1 (Core installation)", }, { status: "affected", version: "2008 R2 for Itanium-Based Systems Service Pack 1", }, { status: "affected", version: "2008 R2 for x64-based Systems Service Pack 1", }, { status: "affected", version: "2008 for 32-bit Systems Service Pack 2 (Core installation)", }, { status: "affected", version: "2008 for Itanium-Based Systems Service Pack 2", }, { status: "affected", version: "2008 for 32-bit Systems Service Pack 2", }, { status: "affected", version: "2008 for x64-based Systems Service Pack 2", }, { status: "affected", version: "2008 for x64-based Systems Service Pack 2 (Core installation)", }, ], }, ], descriptions: [ { lang: "en", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], problemTypes: [ { descriptions: [ { description: "Remote Code Execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-03T17:06:16.000Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secure@microsoft.com", ID: "CVE-2019-0708", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Windows", version: { version_data: [ { version_value: "7 for 32-bit Systems Service Pack 1", }, { version_value: "7 for x64-based Systems Service Pack 1", }, ], }, }, { product_name: "Windows Server", version: { version_data: [ { version_value: "2008 R2 for x64-based Systems Service Pack 1 (Core installation)", }, { version_value: "2008 R2 for Itanium-Based Systems Service Pack 1", }, { version_value: "2008 R2 for x64-based Systems Service Pack 1", }, { version_value: "2008 for 32-bit Systems Service Pack 2 (Core installation)", }, { version_value: "2008 for Itanium-Based Systems Service Pack 2", }, { version_value: "2008 for 32-bit Systems Service Pack 2", }, { version_value: "2008 for x64-based Systems Service Pack 2", }, { version_value: "2008 for x64-based Systems Service Pack 2 (Core installation)", }, ], }, }, ], }, vendor_name: "Microsoft", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Remote Code Execution", }, ], }, ], }, references: { reference_data: [ { name: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", refsource: "MISC", url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { name: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { name: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { name: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { name: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { name: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { name: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2019-0708", datePublished: "2019-05-16T18:17:00.000Z", dateReserved: "2018-11-26T00:00:00.000Z", dateUpdated: "2025-02-07T16:28:16.043Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17301 (GCVE-0-2017-17301)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM |
Version: AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEn ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:51:30.593Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEn ...[truncated*]", }, ], }, ], datePublic: "2017-12-22T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name.", }, ], problemTypes: [ { descriptions: [ { description: "weak cryptography", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17301", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,CloudEngine 12800,CloudEngine 5800,CloudEngine 6800,CloudEngine 7800,DP300,SMC2.0,SRG1300,SRG2300,SRG3300,TE30,TE60,VP9660,ViewPoint 8660,eSpace IAD,eSpace U1981,eSpace USM", version: { version_data: [ { version_value: "AR120-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-SV200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300V500R002C00, SMC2.0V100R003C10, V100R005C00, V500R002C00, SRG1300V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30V100R001C10, TE60V100R003C00, V500R002C00, VP9660V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660V100R008C02, V100R008C03, eSpace IADV300R002C01, eSpace U1981V200R003C20, V200R003C30, eSpace USMV100R001C01, V300R001C00", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "weak cryptography", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17301", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:51:30.593Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19415 (GCVE-0-2019-19415)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.092Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:58:31", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19415", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19415", datePublished: "2020-07-08T16:58:31", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.092Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19417 (GCVE-0-2019-19417)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.230Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:53:05", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19417", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19417", datePublished: "2020-07-08T16:53:05", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.230Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22299 (GCVE-0-2021-22299)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | n/a | ManageOne |
Version: 6.5.0 Version: 6.5.0.SPC100.B210 Version: 6.5.1.1.B010 Version: 6.5.1.1.B020 Version: 6.5.1.1.B030 Version: 6.5.1.1.B040 Version: 6.5.1.SPC100.B050 Version: 6.5.1.SPC101.B010 Version: 6.5.1.SPC101.B040 Version: 6.5.1.SPC200 Version: 6.5.1.SPC200.B010 Version: 6.5.1.SPC200.B030 Version: 6.5.1.SPC200.B040 Version: 6.5.1.SPC200.B050 Version: 6.5.1.SPC200.B060 Version: 6.5.1.SPC200.B070 Version: 6.5.1RC1.B060 Version: 6.5.1RC2.B020 Version: 6.5.1RC2.B030 Version: 6.5.1RC2.B040 Version: 6.5.1RC2.B050 Version: 6.5.1RC2.B060 Version: 6.5.1RC2.B070 Version: 6.5.1RC2.B080 Version: 6.5.1RC2.B090 Version: 6.5.RC2.B050 Version: 8.0.0 Version: 8.0.0-LCND81 Version: 8.0.0.SPC100 Version: 8.0.1 Version: 8.0.RC2 Version: 8.0.RC3 Version: 8.0.RC3.B041 Version: 8.0.RC3.SPC100 |
||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.487Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "ManageOne", vendor: "n/a", versions: [ { status: "affected", version: "6.5.0", }, { status: "affected", version: "6.5.0.SPC100.B210", }, { status: "affected", version: "6.5.1.1.B010", }, { status: "affected", version: "6.5.1.1.B020", }, { status: "affected", version: "6.5.1.1.B030", }, { status: "affected", version: "6.5.1.1.B040", }, { status: "affected", version: "6.5.1.SPC100.B050", }, { status: "affected", version: "6.5.1.SPC101.B010", }, { status: "affected", version: "6.5.1.SPC101.B040", }, { status: "affected", version: "6.5.1.SPC200", }, { status: "affected", version: "6.5.1.SPC200.B010", }, { status: "affected", version: "6.5.1.SPC200.B030", }, { status: "affected", version: "6.5.1.SPC200.B040", }, { status: "affected", version: "6.5.1.SPC200.B050", }, { status: "affected", version: "6.5.1.SPC200.B060", }, { status: "affected", version: "6.5.1.SPC200.B070", }, { status: "affected", version: "6.5.1RC1.B060", }, { status: "affected", version: "6.5.1RC2.B020", }, { status: "affected", version: "6.5.1RC2.B030", }, { status: "affected", version: "6.5.1RC2.B040", }, { status: "affected", version: "6.5.1RC2.B050", }, { status: "affected", version: "6.5.1RC2.B060", }, { status: "affected", version: "6.5.1RC2.B070", }, { status: "affected", version: "6.5.1RC2.B080", }, { status: "affected", version: "6.5.1RC2.B090", }, { status: "affected", version: "6.5.RC2.B050", }, { status: "affected", version: "8.0.0", }, { status: "affected", version: "8.0.0-LCND81", }, { status: "affected", version: "8.0.0.SPC100", }, { status: "affected", version: "8.0.1", }, { status: "affected", version: "8.0.RC2", }, { status: "affected", version: "8.0.RC3", }, { status: "affected", version: "8.0.RC3.B041", }, { status: "affected", version: "8.0.RC3.SPC100", }, ], }, { product: "NFV_FusionSphere", vendor: "n/a", versions: [ { status: "affected", version: "6.5.1.SPC23", }, { status: "affected", version: "8.0.0.SPC12", }, ], }, { product: "SMC2.0", vendor: "n/a", versions: [ { status: "affected", version: "V600R019C00", }, { status: "affected", version: "V600R019C10", }, ], }, { product: "iMaster MAE-M", vendor: "n/a", versions: [ { status: "affected", version: "MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220", }, ], }, ], descriptions: [ { lang: "en", value: "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220.", }, ], problemTypes: [ { descriptions: [ { description: "Local Privilege Escalation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-02-06T01:53:36", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22299", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ManageOne", version: { version_data: [ { version_value: "6.5.0", }, { version_value: "6.5.0.SPC100.B210", }, { version_value: "6.5.1.1.B010", }, { version_value: "6.5.1.1.B020", }, { version_value: "6.5.1.1.B030", }, { version_value: "6.5.1.1.B040", }, { version_value: "6.5.1.SPC100.B050", }, { version_value: "6.5.1.SPC101.B010", }, { version_value: "6.5.1.SPC101.B040", }, { version_value: "6.5.1.SPC200", }, { version_value: "6.5.1.SPC200.B010", }, { version_value: "6.5.1.SPC200.B030", }, { version_value: "6.5.1.SPC200.B040", }, { version_value: "6.5.1.SPC200.B050", }, { version_value: "6.5.1.SPC200.B060", }, { version_value: "6.5.1.SPC200.B070", }, { version_value: "6.5.1RC1.B060", }, { version_value: "6.5.1RC2.B020", }, { version_value: "6.5.1RC2.B030", }, { version_value: "6.5.1RC2.B040", }, { version_value: "6.5.1RC2.B050", }, { version_value: "6.5.1RC2.B060", }, { version_value: "6.5.1RC2.B070", }, { version_value: "6.5.1RC2.B080", }, { version_value: "6.5.1RC2.B090", }, { version_value: "6.5.RC2.B050", }, { version_value: "8.0.0", }, { version_value: "8.0.0-LCND81", }, { version_value: "8.0.0.SPC100", }, { version_value: "8.0.1", }, { version_value: "8.0.RC2", }, { version_value: "8.0.RC3", }, { version_value: "8.0.RC3.B041", }, { version_value: "8.0.RC3.SPC100", }, ], }, }, { product_name: "NFV_FusionSphere", version: { version_data: [ { version_value: "6.5.1.SPC23", }, { version_value: "8.0.0.SPC12", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V600R019C00", }, { version_value: "V600R019C10", }, ], }, }, { product_name: "iMaster MAE-M", version: { version_data: [ { version_value: "MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Local Privilege Escalation", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22299", datePublished: "2021-02-06T01:53:36", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.487Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2015-2808 (GCVE-0-2015-2808)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:24:38.828Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SSRT102127", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { name: "RHSA-2015:1243", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { name: "RHSA-2015:1007", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1007.html", }, { name: "HPSBGN03367", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { name: "HPSBUX03512", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:1006", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1006.html", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256", }, { tags: [ "x_transferred", ], url: "https://kb.juniper.net/JSA10783", }, { name: "1033737", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033737", }, { name: "SUSE-SU-2015:2192", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { name: "HPSBGN03399", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "1036222", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1036222", }, { tags: [ "x_transferred", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { name: "SSRT102129", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/201512-10", }, { name: "RHSA-2015:1229", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650", }, { name: "1032600", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032600", }, { name: "1032910", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032910", }, { name: "USN-2706-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { name: "RHSA-2015:1526", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { name: "SSRT102133", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "1032599", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032599", }, { name: "HPSBMU03401", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380", }, { tags: [ "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10163", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "1032734", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032734", }, { name: "IV71892", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347", }, { name: "1033769", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033769", }, { name: "1032707", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032707", }, { name: "openSUSE-SU-2015:1289", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { name: "HPSBGN03372", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { name: "RHSA-2015:1091", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1091.html", }, { name: "HPSBGN03402", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { name: "IV71888", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888", }, { name: "RHSA-2015:1228", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { name: "HPSBGN03405", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { name: "1032708", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032708", }, { tags: [ "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-454055", }, { name: "DSA-3316", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { name: "SUSE-SU-2015:2166", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "1033415", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033415", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { name: "HPSBGN03366", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { tags: [ "x_transferred", ], url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709", }, { name: "HPSBGN03403", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { name: "SSRT102254", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { tags: [ "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { name: "HPSBGN03407", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { name: "1033432", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033432", }, { name: "HPSBGN03354", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { name: "SUSE-SU-2015:1138", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { name: "1032858", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032858", }, { name: "SSRT102073", tags: [ "vendor-advisory", "x_transferred", ], url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922", }, { name: "1032788", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032788", }, { name: "USN-2696-1", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { tags: [ "x_transferred", ], url: "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf", }, { name: "DSA-3339", tags: [ "vendor-advisory", "x_transferred", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { name: "RHSA-2015:1020", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1020.html", }, { name: "RHSA-2015:1242", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { name: "SUSE-SU-2015:1086", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { name: "1033431", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033431", }, { tags: [ "x_transferred", ], url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988", }, { name: "1032868", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032868", }, { name: "HPSBGN03415", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2015:1319", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { name: "SUSE-SU-2015:1320", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { name: "openSUSE-SU-2015:1288", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { name: "RHSA-2015:1241", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { tags: [ "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { name: "RHSA-2015:1230", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888", }, { name: "HPSBGN03338", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { name: "1033386", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033386", }, { name: "HPSBMU03377", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { name: "1033072", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033072", }, { name: "SSRT102150", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { name: "SUSE-SU-2015:1085", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { tags: [ "x_transferred", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { name: "RHSA-2015:1021", tags: [ "vendor-advisory", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1021.html", }, { tags: [ "x_transferred", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", }, { name: "SUSE-SU-2015:1073", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", }, { tags: [ "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935", }, { name: "SUSE-SU-2015:1161", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { name: "HPSBGN03414", tags: [ "vendor-advisory", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { name: "73684", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securityfocus.com/bid/73684", }, { name: "1032990", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1032990", }, { name: "1033071", tags: [ "vdb-entry", "x_transferred", ], url: "http://www.securitytracker.com/id/1033071", }, { name: "SUSE-SU-2016:0113", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, { tags: [ "x_transferred", ], url: "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-03-26T00:00:00", descriptions: [ { lang: "en", value: "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-09-07T16:46:59.848306", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "SSRT102127", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { name: "RHSA-2015:1243", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { name: "RHSA-2015:1007", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1007.html", }, { name: "HPSBGN03367", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { name: "HPSBUX03512", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { name: "RHSA-2015:1006", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1006.html", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256", }, { url: "https://kb.juniper.net/JSA10783", }, { name: "1033737", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033737", }, { name: "SUSE-SU-2015:2192", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { name: "HPSBGN03399", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { name: "1036222", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1036222", }, { url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { name: "SSRT102129", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { name: "GLSA-201512-10", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/201512-10", }, { name: "RHSA-2015:1229", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650", }, { name: "1032600", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032600", }, { name: "1032910", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032910", }, { name: "USN-2706-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { name: "RHSA-2015:1526", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { name: "SSRT102133", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "1032599", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032599", }, { name: "HPSBMU03401", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380", }, { url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10163", }, { name: "HPSBMU03345", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { name: "1032734", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032734", }, { name: "IV71892", tags: [ "vendor-advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347", }, { name: "1033769", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033769", }, { name: "1032707", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032707", }, { name: "openSUSE-SU-2015:1289", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { name: "HPSBGN03372", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { name: "RHSA-2015:1091", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1091.html", }, { name: "HPSBGN03402", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { name: "IV71888", tags: [ "vendor-advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888", }, { name: "RHSA-2015:1228", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { name: "HPSBGN03405", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { name: "1032708", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032708", }, { url: "http://www.huawei.com/en/psirt/security-advisories/hw-454055", }, { name: "DSA-3316", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { name: "SUSE-SU-2015:2166", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "1033415", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033415", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { name: "HPSBGN03366", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709", }, { name: "HPSBGN03403", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { name: "SSRT102254", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { name: "HPSBGN03407", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { name: "1033432", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033432", }, { name: "HPSBGN03354", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { name: "SUSE-SU-2015:1138", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { name: "1032858", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032858", }, { name: "SSRT102073", tags: [ "vendor-advisory", ], url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922", }, { name: "1032788", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032788", }, { name: "USN-2696-1", tags: [ "vendor-advisory", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { url: "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf", }, { name: "DSA-3339", tags: [ "vendor-advisory", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { name: "RHSA-2015:1020", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1020.html", }, { name: "RHSA-2015:1242", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { name: "SUSE-SU-2015:1086", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { name: "1033431", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033431", }, { url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988", }, { name: "1032868", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032868", }, { name: "HPSBGN03415", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { name: "91787", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/91787", }, { name: "SUSE-SU-2015:1319", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { name: "SUSE-SU-2015:1320", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { name: "openSUSE-SU-2015:1288", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { name: "RHSA-2015:1241", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { name: "RHSA-2015:1230", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888", }, { name: "HPSBGN03338", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { name: "1033386", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033386", }, { name: "HPSBMU03377", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { name: "1033072", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033072", }, { name: "SSRT102150", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { name: "SUSE-SU-2015:1085", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { name: "RHSA-2015:1021", tags: [ "vendor-advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1021.html", }, { url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", }, { name: "SUSE-SU-2015:1073", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", }, { url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935", }, { name: "SUSE-SU-2015:1161", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { name: "HPSBGN03414", tags: [ "vendor-advisory", ], url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { name: "73684", tags: [ "vdb-entry", ], url: "http://www.securityfocus.com/bid/73684", }, { name: "1032990", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1032990", }, { name: "1033071", tags: [ "vdb-entry", ], url: "http://www.securitytracker.com/id/1033071", }, { name: "SUSE-SU-2016:0113", tags: [ "vendor-advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, { url: "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-2808", datePublished: "2015-04-01T00:00:00", dateReserved: "2015-03-31T00:00:00", dateUpdated: "2024-08-06T05:24:38.828Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-8162 (GCVE-0-2017-8162)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 |
Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:27:22.877Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]", }, ], }, ], datePublic: "2017-11-15T00:00:00", descriptions: [ { lang: "en", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-22T18:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-11-15T00:00:00", ID: "CVE-2017-8162", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", version: { version_data: [ { version_value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-8162", datePublished: "2017-11-22T19:00:00Z", dateReserved: "2017-04-25T00:00:00", dateUpdated: "2024-09-16T19:41:24.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22340 (GCVE-0-2021-22340)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | ManageOne;SMC2.0 |
Version: 6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100 Version: V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.593Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "ManageOne;SMC2.0", vendor: "n/a", versions: [ { status: "affected", version: "6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100", }, { status: "affected", version: "V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931", }, ], }, ], descriptions: [ { lang: "en", value: "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931", }, ], problemTypes: [ { descriptions: [ { description: "Multiple Threads Race Condition", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T18:45:03", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22340", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ManageOne;SMC2.0", version: { version_data: [ { version_value: "6.5.1.SPC200,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.SPC100", }, { version_value: "V600R019C10SPC700,V600R019C10SPC702,V600R019C10SPC703,V600R019C10SPC800,V600R019C10SPC900,V600R019C10SPC910,V600R019C10SPC920,V600R019C10SPC921,V600R019C10SPC922,V600R019C10SPC930,V600R019C10SPC931", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Multiple Threads Race Condition", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22340", datePublished: "2021-06-29T18:45:03", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.593Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-8163 (GCVE-0-2017-8163)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 |
Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:27:22.805Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]", }, ], }, ], datePublic: "2017-11-15T00:00:00", descriptions: [ { lang: "en", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-22T18:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-11-15T00:00:00", ID: "CVE-2017-8163", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", version: { version_data: [ { version_value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-8163", datePublished: "2017-11-22T19:00:00Z", dateReserved: "2017-04-25T00:00:00", dateUpdated: "2024-09-16T18:09:25.595Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-202007-0476
Vulnerability from variot
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200, etc. are all enterprise routers of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0476", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "usg9500 v500r001c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v100r001c10", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v500r002c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v600r006c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c50", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c30", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc800", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400b001", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcf00", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp16", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcc00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp02", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc201t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc206t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc102t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc400", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc209t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc702t", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100b015t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc701t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc300", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc400", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc600", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd01t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc200", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcj00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spci00", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp04", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd04t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc103t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc201b023t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc100", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc200t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc207t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc404t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd05t", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp03", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spca00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spch00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc700", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc402t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc104t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101tb015", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "tp3206", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc100", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc206t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc900", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc500", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc502", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc203t", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100b012", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca02t", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc800", }, { model: "usg9520", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc800pwe", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spca00", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcc00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc202b025t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc401t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00spc200", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc700", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc201t", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc403t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc205t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc405t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc203t", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc300", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "rse6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc102", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700t", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc301t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "usg9560", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc400", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc100", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce00", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd03t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce01t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph702", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc180t", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc900", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc204t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc100", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc100", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01sph703", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc208t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb01t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc200", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc600", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc001t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200t", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc200", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc900", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp15", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcg00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc103", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc100", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20lcrw01t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcc00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc300", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd02t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc400", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc901t", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc703t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc300t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200b022t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc101b001t", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01t", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500t", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b015sp03", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c02spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300t", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcd00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00t", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar160", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v200r003c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "dp300 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc101b001t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc102", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc103", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc201t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3206 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rse6500 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c16pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6800 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v600r006c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc800", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spca00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c01spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc800", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v100r001c20spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v200r003c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6800 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc500t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spca00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01sph703", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c01spc800pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c20spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc300t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc100b015t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc101", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc101tb015", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc102t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-19415", }, ], }, cve: "CVE-2019-19415", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015759", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2020-52408", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015759", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-19415", trust: 1, value: "HIGH", }, { author: "NVD", id: "JVNDB-2019-015759", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-52408", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202007-385", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, { db: "CNNVD", id: "CNNVD-202007-385", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200, etc. are all enterprise routers of China's Huawei (Huawei) company", sources: [ { db: "NVD", id: "CVE-2019-19415", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "CNVD", id: "CNVD-2020-52408", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-19415", trust: 3, }, { db: "JVNDB", id: "JVNDB-2019-015759", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-52408", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202007-385", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, { db: "CNNVD", id: "CNNVD-202007-385", }, ], }, id: "VAR-202007-0476", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, ], trust: 1.5390942141968909, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, ], }, last_update_date: "2023-12-18T12:35:28.013000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200115-01-sip", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { title: "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-52408)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/234367", }, { title: "Multiple Huawei Product input verification error vulnerability fixes", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=123633", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "CNNVD", id: "CNNVD-202007-385", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.8, }, { problemtype: "CWE-119", trust: 1, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19415", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19415", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, { db: "CNNVD", id: "CNNVD-202007-385", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-52408", }, { db: "JVNDB", id: "JVNDB-2019-015759", }, { db: "NVD", id: "CVE-2019-19415", }, { db: "CNNVD", id: "CNNVD-202007-385", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-09-17T00:00:00", db: "CNVD", id: "CNVD-2020-52408", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015759", }, { date: "2020-07-08T17:15:09.513000", db: "NVD", id: "CVE-2019-19415", }, { date: "2020-07-08T00:00:00", db: "CNNVD", id: "CNNVD-202007-385", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-09-17T00:00:00", db: "CNVD", id: "CNVD-2020-52408", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015759", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2019-19415", }, { date: "2020-07-14T00:00:00", db: "CNNVD", id: "CNNVD-202007-385", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202007-385", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product input verification vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2019-015759", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202007-385", }, ], trust: 0.6, }, }
var-202007-0473
Vulnerability from variot
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0473", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc800", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400b001", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcf00", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp16", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcc00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp02", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc201t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc206t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc102t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc400", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc209t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc702t", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100b015t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc701t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc300", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc400", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc600", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd01t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc200", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcj00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spci00", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp04", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd04t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc103t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc201b023t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc100", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc200t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc207t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc404t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd05t", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp03", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spca00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spch00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc700", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc402t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc104t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101tb015", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "tp3206", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc100", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc206t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc900", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc500", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc502", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc203t", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100b012", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca02t", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc800", }, { model: "usg9520", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc800pwe", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spca00", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcc00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc202b025t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc401t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00spc200", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc700", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc201t", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc403t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc205t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc405t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc203t", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc300", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "rse6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc102", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700t", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc301t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "usg9560", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc400", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc100", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce00", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd03t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce01t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph702", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc180t", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc900", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc204t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc100", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc100", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01sph703", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc208t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb01t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc200", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc600", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc001t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200t", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc200", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc900", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp15", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcg00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc103", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc100", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20lcrw01t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcc00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc300", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd02t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc400", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc901t", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc703t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc300t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200b022t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc101b001t", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01t", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500t", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b015sp03", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c02spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300t", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcd00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00t", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar160", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-19417", }, ], }, cve: "CVE-2019-19417", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015761", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULMON", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CVE-2019-19417", impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "MEDIUM", trust: 0.1, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015761", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-19417", trust: 1, value: "HIGH", }, { author: "NVD", id: "JVNDB-2019-015761", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-202007-388", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2019-19417", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, { db: "CNNVD", id: "CNNVD-202007-388", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state", sources: [ { db: "NVD", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "VULMON", id: "CVE-2019-19417", }, ], trust: 1.71, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-19417", trust: 2.5, }, { db: "JVNDB", id: "JVNDB-2019-015761", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202007-388", trust: 0.6, }, { db: "VULMON", id: "CVE-2019-19417", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, { db: "CNNVD", id: "CNNVD-202007-388", }, ], }, id: "VAR-202007-0473", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.4867788683333333, }, last_update_date: "2023-12-18T12:16:58.914000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200115-01-sip", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { title: "Multiple Huawei Product input verification error vulnerability fixes", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=123635", }, { title: "Huawei Security Advisories: Security Advisory - Three DoS Vulnerabilities in the SIP Module of Some Huawei Products", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=562bd5cf3eb2837f3a77313a6408f674", }, ], sources: [ { db: "VULMON", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "CNNVD", id: "CNNVD-202007-388", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.8, }, { problemtype: "CWE-119", trust: 1, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19417", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19417", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/119.html", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/20.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, { db: "CNNVD", id: "CNNVD-202007-388", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2019-19417", }, { db: "JVNDB", id: "JVNDB-2019-015761", }, { db: "NVD", id: "CVE-2019-19417", }, { db: "CNNVD", id: "CNNVD-202007-388", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-07-08T00:00:00", db: "VULMON", id: "CVE-2019-19417", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015761", }, { date: "2020-07-08T17:15:09.640000", db: "NVD", id: "CVE-2019-19417", }, { date: "2020-07-08T00:00:00", db: "CNNVD", id: "CNNVD-202007-388", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-07-21T00:00:00", db: "VULMON", id: "CVE-2019-19417", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015761", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2019-19417", }, { date: "2020-07-14T00:00:00", db: "CNNVD", id: "CNNVD-202007-388", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202007-388", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product input verification vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2019-015761", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202007-388", }, ], trust: 0.6, }, }
var-202106-0605
Vulnerability from variot
There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931. ManageOne and SMC2.0 Is vulnerable to a race condition.Denial of service (DoS) It may be put into a state. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. Many Huawei products have security vulnerabilities. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0605", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc703", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc900", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "8.0.0", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "6.5.1", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc700", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc922", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc931", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc910", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc920", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "8.0.1", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc702", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc930", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10spc921", }, { model: "manageone", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc702:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc910:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc920:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc921:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc922:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc930:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc931:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-22340", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The vulnerability was discovered by Huawei's internal testing", sources: [ { db: "CNNVD", id: "CNNVD-202106-1952", }, ], trust: 0.6, }, cve: "CVE-2021-22340", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 4.7, confidentialityImpact: "NONE", exploitabilityScore: 3.4, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 4.7, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-22340", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.9, userInteractionRequired: null, vectorString: "AV:L/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 4.7, confidentialityImpact: "NONE", exploitabilityScore: 3.4, id: "VHN-380775", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:L/AC:M/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "HIGH", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 4.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 0.5, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "High", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 4.1, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-22340", impactScore: null, integrityImpact: "None", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-22340", trust: 1.8, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202106-1952", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-380775", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2021-22340", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-380775", }, { db: "VULMON", id: "CVE-2021-22340", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, { db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931. ManageOne and SMC2.0 Is vulnerable to a race condition.Denial of service (DoS) It may be put into a state. Huawei Manageone is a set of cloud data center management solutions of China Huawei (Huawei). The product supports unified management of heterogeneous cloud resource pools, and provides functions such as multi-level VDC matching customer organization model, service catalog planning, self-service, centralized alarm analysis, and intelligent operation and maintenance. Many Huawei products have security vulnerabilities. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931 ", sources: [ { db: "NVD", id: "CVE-2021-22340", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "VULHUB", id: "VHN-380775", }, { db: "VULMON", id: "CVE-2021-22340", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-22340", trust: 3.4, }, { db: "JVNDB", id: "JVNDB-2021-008910", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202106-1952", trust: 0.7, }, { db: "CS-HELP", id: "SB2021102124", trust: 0.6, }, { db: "VULHUB", id: "VHN-380775", trust: 0.1, }, { db: "VULMON", id: "CVE-2021-22340", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-380775", }, { db: "VULMON", id: "CVE-2021-22340", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, { db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, id: "VAR-202106-0605", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-380775", }, ], trust: 0.01, }, last_update_date: "2023-12-18T12:16:22.747000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20210428-01-racecondition", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, { title: "Huawei Manageone Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155504", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-362", trust: 1.1, }, { problemtype: "Race condition (CWE-362) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-380775", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22340", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210428-01-racecondition-cn", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021102124", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/362.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULHUB", id: "VHN-380775", }, { db: "VULMON", id: "CVE-2021-22340", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, { db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-380775", }, { db: "VULMON", id: "CVE-2021-22340", }, { db: "JVNDB", id: "JVNDB-2021-008910", }, { db: "NVD", id: "CVE-2021-22340", }, { db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-06-29T00:00:00", db: "VULHUB", id: "VHN-380775", }, { date: "2021-06-29T00:00:00", db: "VULMON", id: "CVE-2021-22340", }, { date: "2022-03-31T00:00:00", db: "JVNDB", id: "JVNDB-2021-008910", }, { date: "2021-06-29T19:15:09.180000", db: "NVD", id: "CVE-2021-22340", }, { date: "2021-06-29T00:00:00", db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-07-07T00:00:00", db: "VULHUB", id: "VHN-380775", }, { date: "2021-07-07T00:00:00", db: "VULMON", id: "CVE-2021-22340", }, { date: "2022-03-31T06:36:00", db: "JVNDB", id: "JVNDB-2021-008910", }, { date: "2021-07-07T12:34:40.027000", db: "NVD", id: "CVE-2021-22340", }, { date: "2021-10-26T00:00:00", db: "CNNVD", id: "CNNVD-202106-1952", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202106-1952", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "ManageOne and SMC2.0 Race Vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2021-008910", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "competition condition problem", sources: [ { db: "CNNVD", id: "CNNVD-202106-1952", }, ], trust: 0.6, }, }
var-201711-1008
Vulnerability from variot
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A cross-border read vulnerability exists in several Huawei products due to the device's failure to fully verify user input. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. The vulnerability is caused by the program's insufficient implementation of input validation. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1008", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c01", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c13", }, { model: "ar2200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c20", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c20", }, { model: "ar2200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c10", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c02", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar160", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar3200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar510", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "netengine16ex", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg1300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg2300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg3300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-8163", }, ], }, cve: "CVE-2017-8163", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", exploitabilityScore: 8, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Complete", baseScore: 6.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8163", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", exploitabilityScore: 8, id: "CNVD-2017-34449", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", exploitabilityScore: 8, id: "VHN-116366", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 2.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 6.5, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8163", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-8163", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2017-34449", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201711-968", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-116366", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A cross-border read vulnerability exists in several Huawei products due to the device's failure to fully verify user input. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. The vulnerability is caused by the program's insufficient implementation of input validation. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200", sources: [ { db: "NVD", id: "CVE-2017-8163", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-8163", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-010624", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201711-968", trust: 0.7, }, { db: "CNVD", id: "CNVD-2017-34449", trust: 0.6, }, { db: "VULHUB", id: "VHN-116366", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, id: "VAR-201711-1008", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, ], trust: 1.6829639047777778, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, ], }, last_update_date: "2023-12-18T12:57:10.567000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20171018-01-h323", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { title: "Patch of various Huawei products beyond the boundary read vulnerability (CNVD-2017-34449)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/106350", }, { title: "Multiple Huawei Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76678", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-125", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-116366", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8163", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-8163", }, { trust: 0.6, url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171018-01-h323-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2017-34449", }, { db: "VULHUB", id: "VHN-116366", }, { db: "JVNDB", id: "JVNDB-2017-010624", }, { db: "NVD", id: "CVE-2017-8163", }, { db: "CNNVD", id: "CNNVD-201711-968", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-17T00:00:00", db: "CNVD", id: "CNVD-2017-34449", }, { date: "2017-11-22T00:00:00", db: "VULHUB", id: "VHN-116366", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010624", }, { date: "2017-11-22T19:29:03.803000", db: "NVD", id: "CVE-2017-8163", }, { date: "2017-11-23T00:00:00", db: "CNNVD", id: "CNNVD-201711-968", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-17T00:00:00", db: "CNVD", id: "CNVD-2017-34449", }, { date: "2017-12-08T00:00:00", db: "VULHUB", id: "VHN-116366", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010624", }, { date: "2017-12-08T19:05:03.227000", db: "NVD", id: "CVE-2017-8163", }, { date: "2017-11-30T00:00:00", db: "CNNVD", id: "CNNVD-201711-968", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201711-968", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product out-of-bounds vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2017-010624", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "lack of information", sources: [ { db: "CNNVD", id: "CNNVD-201711-968", }, ], trust: 0.6, }, }
var-201802-0545
Vulnerability from variot
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. The vulnerability was caused by the program failing to fully verify the message. Huawei AR120-S and others are all routers of China Huawei (Huawei). H323 protocol is one of the audio and video protocols. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0545", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ar150", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c01", }, { model: "ar1200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c10", }, { model: "ar150", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c10", }, { model: "ar150", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c20", }, { model: "ar150-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c00", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "rse6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "tp3106", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "usg9580", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00t", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "usg9580", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "rp200", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "usg9520", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c02", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "usg9560", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "rp200", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "max presence", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00t", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "tp3206", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "usg9560", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc200", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "usg9520", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc200", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "dp300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "max presence", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ngfw module", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9580 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "dp300 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3106 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "viewpoint v100r011c03", scope: "eq", trust: 0.6, vendor: "huawei", version: "9030", }, { model: "viewpoint v100r011c02", scope: "eq", trust: 0.6, vendor: "huawei", version: "9030", }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "max presence v100r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3206 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rp200 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rse6500 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c10spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c10spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6800 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rp200 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9580 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-15332", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei internal tester", sources: [ { db: "CNNVD", id: "CNNVD-201711-1149", }, ], trust: 0.6, }, cve: "CVE-2017-15332", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-15332", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2017-35592", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-106144", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 1.4, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "Low", baseScore: 5.3, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-15332", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-15332", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2017-35592", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201711-1149", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-106144", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. plural Huawei The product contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. The vulnerability was caused by the program failing to fully verify the message. Huawei AR120-S and others are all routers of China Huawei (Huawei). H323 protocol is one of the audio and video protocols. The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15", sources: [ { db: "NVD", id: "CVE-2017-15332", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-15332", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-012503", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201711-1149", trust: 0.7, }, { db: "CNVD", id: "CNVD-2017-35592", trust: 0.6, }, { db: "VULHUB", id: "VHN-106144", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, id: "VAR-201802-0545", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, ], trust: 1.6427522879729723, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, ], }, last_update_date: "2023-12-18T13:29:01.171000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20171129-01-h323", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { title: "Patches for various Huawei product H323 protocol memory leak vulnerabilities", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/107345", }, { title: "Multiple Huawei product H323 Fixing measures for protocol security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76804", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-772", trust: 1.1, }, { problemtype: "CWE-399", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-106144", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15332", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-15332", }, { trust: 0.6, url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171129-01-h323-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2017-35592", }, { db: "VULHUB", id: "VHN-106144", }, { db: "JVNDB", id: "JVNDB-2017-012503", }, { db: "NVD", id: "CVE-2017-15332", }, { db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-30T00:00:00", db: "CNVD", id: "CNVD-2017-35592", }, { date: "2018-02-15T00:00:00", db: "VULHUB", id: "VHN-106144", }, { date: "2018-03-16T00:00:00", db: "JVNDB", id: "JVNDB-2017-012503", }, { date: "2018-02-15T16:29:00.377000", db: "NVD", id: "CVE-2017-15332", }, { date: "2017-11-30T00:00:00", db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-30T00:00:00", db: "CNVD", id: "CNVD-2017-35592", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106144", }, { date: "2018-03-16T00:00:00", db: "JVNDB", id: "JVNDB-2017-012503", }, { date: "2019-10-03T00:03:26.223000", db: "NVD", id: "CVE-2017-15332", }, { date: "2019-10-23T00:00:00", db: "CNNVD", id: "CNNVD-201711-1149", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201711-1149", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Resource management vulnerabilities in products", sources: [ { db: "JVNDB", id: "JVNDB-2017-012503", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201711-1149", }, ], trust: 0.6, }, }
var-201802-0298
Vulnerability from variot
Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name. plural Huawei The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A weak encryption algorithm vulnerability exists in several Huawei products because the program failed to correctly parse the value in the certificate. A remote attacker can exploit this vulnerability to forge an RSA signature with a specially crafted certificate. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R008C20 Version; AR1200 V200R005C20 Version, V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version; AR1200-S V200R005C32 Version , V200R006C10 version, V200R007C00 version, V200R008C20; AR150, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0298", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "cloudengine 6800", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r003c10", }, { model: "cloudengine 5800", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r001c00", }, { model: "espace usm", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c00", }, { model: "espace iad", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r002c01", }, { model: "espace usm", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r001c01", }, { model: "espace u1981", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r003c20", }, { model: "cloudengine 6800", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r003c00", }, { model: "cloudengine 6800", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r006c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r008c03", }, { model: "espace u1981", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r003c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "cloudengine 5800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r006c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c00", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c02", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "cloudengine 5800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r006c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r006c00", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c10", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "cloudengine 6800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "cloudengine 5800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c10", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "cloudengine 6800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "cloudengine 12800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "cloudengine 5800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c10", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c20", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "cloudengine 5800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "cloudengine 7800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c32", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r005c20", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "cloudengine 6800", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c10", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "cloudengine 12800", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "dp300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "espace iad", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg1300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "te30", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "viewpoint 8660", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "vp9660", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r005c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r005c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "cloudengine v100r003c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r003c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r005c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r005c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r006c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r002c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v200r001c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "12800", }, { model: "cloudengine v100r003c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r005c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r005c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r006c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r002c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r003c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v200r001c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "5800", }, { model: "cloudengine v100r003c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r005c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r005c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r006c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r002c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r003c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v200r001c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "6800", }, { model: "cloudengine v100r003c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "cloudengine v100r005c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "cloudengine v100r005c10", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "cloudengine v100r006c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "cloudengine v100r003c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "cloudengine v200r001c00", scope: "eq", trust: 0.6, vendor: "huawei", version: "7800", }, { model: "dp300 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r005c32", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "viewpoint v100r008c03", scope: "eq", trust: 0.6, vendor: "huawei", version: "8660", }, { model: "viewpoint v100r008c02", scope: "eq", trust: 0.6, vendor: "huawei", version: "8660", }, { model: "espace iad v300r002c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v200r003c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace u1981 v200r003c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace usm v100r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "espace usm v300r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_iad_firmware:v300r002c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_iad:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_usm_firmware:v100r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_usm_firmware:v300r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_usm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-17301", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei internal tester", sources: [ { db: "CNNVD", id: "CNNVD-201712-871", }, ], trust: 0.6, }, cve: "CVE-2017-17301", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 7.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2017-17301", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2017-38101", impactScore: 4.9, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-108310", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2017-17301", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-17301", trust: 1.8, value: "CRITICAL", }, { author: "CNVD", id: "CNVD-2017-38101", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201712-871", trust: 0.6, value: "CRITICAL", }, { author: "VULHUB", id: "VHN-108310", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name. plural Huawei The product contains cryptographic vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei AR120-S is a router product of China Huawei. A weak encryption algorithm vulnerability exists in several Huawei products because the program failed to correctly parse the value in the certificate. A remote attacker can exploit this vulnerability to forge an RSA signature with a specially crafted certificate. There are security vulnerabilities in several Huawei products. The following products and versions are affected: Huawei AR120-S V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R008C20 Version; AR1200 V200R005C20 Version, V200R005C32 Version, V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version; AR1200-S V200R005C32 Version , V200R006C10 version, V200R007C00 version, V200R008C20; AR150, etc", sources: [ { db: "NVD", id: "CVE-2017-17301", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-17301", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-012621", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201712-871", trust: 0.7, }, { db: "CNVD", id: "CNVD-2017-38101", trust: 0.6, }, { db: "VULHUB", id: "VHN-108310", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, id: "VAR-201802-0298", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, ], trust: 1.6440302261320752, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, ], }, last_update_date: "2023-12-18T13:13:58.868000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20171222-01-cryptography", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, { title: "Patches for multiple Huawei product weak encryption algorithm vulnerabilities", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/111723", }, { title: "Multiple Huawei Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=77320", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-295", trust: 1.1, }, { problemtype: "CWE-310", trust: 0.9, }, ], sources: [ { db: "VULHUB", id: "VHN-108310", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17301", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-17301", }, { trust: 0.6, url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171222-01-cryptography-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2017-38101", }, { db: "VULHUB", id: "VHN-108310", }, { db: "JVNDB", id: "JVNDB-2017-012621", }, { db: "NVD", id: "CVE-2017-17301", }, { db: "CNNVD", id: "CNNVD-201712-871", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-12-26T00:00:00", db: "CNVD", id: "CNVD-2017-38101", }, { date: "2018-02-15T00:00:00", db: "VULHUB", id: "VHN-108310", }, { date: "2018-03-27T00:00:00", db: "JVNDB", id: "JVNDB-2017-012621", }, { date: "2018-02-15T16:29:03.610000", db: "NVD", id: "CVE-2017-17301", }, { date: "2017-12-25T00:00:00", db: "CNNVD", id: "CNNVD-201712-871", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-12-26T00:00:00", db: "CNVD", id: "CNVD-2017-38101", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-108310", }, { date: "2018-03-27T00:00:00", db: "JVNDB", id: "JVNDB-2017-012621", }, { date: "2019-10-03T00:03:26.223000", db: "NVD", id: "CVE-2017-17301", }, { date: "2019-10-23T00:00:00", db: "CNNVD", id: "CNNVD-201712-871", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201712-871", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Cryptographic vulnerabilities in products", sources: [ { db: "JVNDB", id: "JVNDB-2017-012621", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "trust management problem", sources: [ { db: "CNNVD", id: "CNNVD-201712-871", }, ], trust: 0.6, }, }
var-201711-1007
Vulnerability from variot
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A denial of service vulnerability exists in several Huawei products because the device failed to properly handle malformed messages. Huawei AR120-S and others are all router products of China Huawei (Huawei). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1007", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c10", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c01", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c20", }, { model: "ar510", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c10", }, { model: "ar2200-s", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r006c11", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r008c00", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1.6, vendor: "huawei", version: "v200r007c02", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar160", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar3200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar510", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "netengine16ex", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg1300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg2300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "srg3300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c16pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-8162", }, ], }, cve: "CVE-2017-8162", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", exploitabilityScore: 8, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "Partial", baseScore: 4, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8162", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", exploitabilityScore: 8, id: "CNVD-2017-34448", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", exploitabilityScore: 8, id: "VHN-116365", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 2.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 6.5, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8162", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-8162", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2017-34448", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201711-969", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-116365", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable. plural Huawei The product contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The AR series, SRG series, and NetEngine16EX service routing gateways are Huawei's all-in-one integrated service gateways for small and medium-sized branches and small and medium-sized enterprises. Huawei SMC2.0 is a video service management platform. A denial of service vulnerability exists in several Huawei products because the device failed to properly handle malformed messages. Huawei AR120-S and others are all router products of China Huawei (Huawei). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR150 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR150-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR160 V200R006C10 Version, V200R006C12 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR200 V200R006C10 Version, V200R007C00 Version, V200R007C01 Version, V200R008C20 Version, V200R008C30 Version; AR200-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR2200", sources: [ { db: "NVD", id: "CVE-2017-8162", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-8162", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-010623", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201711-969", trust: 0.7, }, { db: "CNVD", id: "CNVD-2017-34448", trust: 0.6, }, { db: "VULHUB", id: "VHN-116365", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, id: "VAR-201711-1007", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, ], trust: 1.6831511146153846, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, ], }, last_update_date: "2023-12-18T12:19:19.021000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20171018-01-h323", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { title: "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2017-34448)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/106349", }, { title: "Multiple Huawei Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76679", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-116365", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8162", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-8162", }, { trust: 0.6, url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171018-01-h323-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2017-34448", }, { db: "VULHUB", id: "VHN-116365", }, { db: "JVNDB", id: "JVNDB-2017-010623", }, { db: "NVD", id: "CVE-2017-8162", }, { db: "CNNVD", id: "CNNVD-201711-969", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-17T00:00:00", db: "CNVD", id: "CNVD-2017-34448", }, { date: "2017-11-22T00:00:00", db: "VULHUB", id: "VHN-116365", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010623", }, { date: "2017-11-22T19:29:03.773000", db: "NVD", id: "CVE-2017-8162", }, { date: "2017-11-23T00:00:00", db: "CNNVD", id: "CNNVD-201711-969", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-17T00:00:00", db: "CNVD", id: "CNVD-2017-34448", }, { date: "2017-12-08T00:00:00", db: "VULHUB", id: "VHN-116365", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010623", }, { date: "2017-12-08T19:03:57.663000", db: "NVD", id: "CVE-2017-8162", }, { date: "2017-11-23T00:00:00", db: "CNNVD", id: "CNNVD-201711-969", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201711-969", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product buffer error vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2017-010623", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer overflow", sources: [ { db: "CNNVD", id: "CNNVD-201711-969", }, ], trust: 0.6, }, }
var-201802-0550
Vulnerability from variot
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. A cross-border read vulnerability exists in the H323 protocol of several Huawei products. The vulnerability is caused by the program failing to fully verify the message. The attacker restarts the process by sending a specially constructed packet. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. A remote attacker could exploit this vulnerability to cause a denial of service (out-of-bounds read and process restart). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0550", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "usg9500", scope: "eq", trust: 1.6, vendor: "huawei", version: "v500r001c50", }, { model: "usg9580", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c20", }, { model: "usg9580", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c01", }, { model: "usg9520", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c20", }, { model: "viewpoint 9030", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r011c02", }, { model: "usg9560", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c20", }, { model: "viewpoint 9030", scope: "eq", trust: 1.6, vendor: "huawei", version: "v100r011c03", }, { model: "usg9560", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c01", }, { model: "usg9520", scope: "eq", trust: 1.6, vendor: "huawei", version: "v300r001c01", }, { model: "usg9500", scope: "eq", trust: 1.6, vendor: "huawei", version: "v500r001c30", }, { model: "secospace usg6300 v500r001c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "rse6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "tp3106", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00t", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "rp200", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "rp200", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "max presence", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00t", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "tp3206", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc200", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc200", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "dp300", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "max presence", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ngfw module", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9580 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "dp300 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3106 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "viewpoint v100r011c03", scope: "eq", trust: 0.6, vendor: "huawei", version: "9030", }, { model: "viewpoint v100r011c02", scope: "eq", trust: 0.6, vendor: "huawei", version: "9030", }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "max presence v100r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3206 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rp200 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rse6500 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c16pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c10spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c10spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rp200 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9580 v300r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-15331", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei internal tester", sources: [ { db: "CNNVD", id: "CNNVD-201711-1148", }, ], trust: 0.6, }, cve: "CVE-2017-15331", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-15331", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2017-35591", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-106143", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 1.4, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "Low", baseScore: 5.3, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-15331", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-15331", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2017-35591", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201711-1148", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-106143", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. plural Huawei The product contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei AR and SRG series enterprise routers are Huawei's all-in-one routers for small and medium-sized offices or small and medium-sized enterprises. Huawei's SVN series products are Huawei's secure access gateway products; NIP6300/6600 series products and SecospaceUSG series. Huawei is a new generation of professional intrusion prevention and firewall products for customers such as enterprises, IDCs, campus networks and operators. The TE series is a high definition video conferencing terminal that supports 1080p60. A cross-border read vulnerability exists in the H323 protocol of several Huawei products. The vulnerability is caused by the program failing to fully verify the message. The attacker restarts the process by sending a specially constructed packet. Huawei AR120-S and others are all router products of China Huawei (Huawei). There are security vulnerabilities in several Huawei products. A remote attacker could exploit this vulnerability to cause a denial of service (out-of-bounds read and process restart). The following products and versions are affected: Huawei AR120-S V200R006C10 Version, V200R007C00 Version, V200R008C20 Version, V200R008C30 Version; AR1200 V200R006C10 Version, V200R006C13 Version, V200R007C00 Version, V200R007C01 Version, V200R007C02 Version, V200R008C20 Version, V200R008C30 Version; AR1200-S V200R006C10 Version , V200R007C00, V200R008C20, V200R008C30; AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30-S; AR15", sources: [ { db: "NVD", id: "CVE-2017-15331", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-15331", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2017-012502", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201711-1148", trust: 0.7, }, { db: "CNVD", id: "CNVD-2017-35591", trust: 0.6, }, { db: "VULHUB", id: "VHN-106143", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, id: "VAR-201802-0550", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, ], trust: 1.6431707818120804, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, ], }, last_update_date: "2023-12-18T13:13:58.624000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20171129-01-h323", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { title: "Patches for a variety of Huawei products H323 protocol out of bounds read vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/107343", }, { title: "Multiple Huawei Product Buffer Error Vulnerability Fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76803", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-125", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-106143", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-15331", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-15331", }, { trust: 0.6, url: "http://www.huawei.com/cn/psirt/security-advisories/2017/huawei-sa-20171129-01-h323-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2017-35591", }, { db: "VULHUB", id: "VHN-106143", }, { db: "JVNDB", id: "JVNDB-2017-012502", }, { db: "NVD", id: "CVE-2017-15331", }, { db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-30T00:00:00", db: "CNVD", id: "CNVD-2017-35591", }, { date: "2018-02-15T00:00:00", db: "VULHUB", id: "VHN-106143", }, { date: "2018-03-16T00:00:00", db: "JVNDB", id: "JVNDB-2017-012502", }, { date: "2018-02-15T16:29:00.330000", db: "NVD", id: "CVE-2017-15331", }, { date: "2017-11-30T00:00:00", db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-30T00:00:00", db: "CNVD", id: "CNVD-2017-35591", }, { date: "2018-03-01T00:00:00", db: "VULHUB", id: "VHN-106143", }, { date: "2018-03-16T00:00:00", db: "JVNDB", id: "JVNDB-2017-012502", }, { date: "2018-03-01T14:46:36.490000", db: "NVD", id: "CVE-2017-15331", }, { date: "2017-11-30T00:00:00", db: "CNNVD", id: "CNNVD-201711-1148", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201711-1148", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product out-of-bounds vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2017-012502", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-201711-1148", }, ], trust: 0.6, }, }
var-202102-0639
Vulnerability from variot
There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220. plural Huawei The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Several Huawei products have a security vulnerability, which stems from the application not properly imposing security restrictions, resulting in bypassing security restrictions and privilege escalation. The following devices or models have this vulnerability: manageone 8.0.rc3.spc100, manageone 8.0.rc3.b041, manageone 8.0.rc3, manageone 8.0.0.spc100, manageone 8.0.0-lcnd81, manageone 6.5.1rc2.b030, manageone 6.5 .1rc2.b020, manageone 6.5.1rc1.b060, manageone 6.5.0.spc100.b210, manageone 8.0.rc2, manageone 6.5.1rc2.b090, manageone 6.5.1rc2.b080, manageone 6.5.1rc2.b070, manageone 6.5. 1rc2.b060, manageone 6.5.1rc2.b050, manageone 6.5.1rc2.b040, manageone 6.5.1.spc200.b070, manageone 6.5.1.spc200.b060, manageone 6.5.1.spc200.b050, manageone 6.5.1. spc200.b040, manageone 6.5.1.spc200.b030, manageone 6.5.1.spc200.b010, manageone 6.5.1.spc200, manageone 6.5.1.spc101.b040, manageone 6.5.1.spc101.b010, manageone 6.5. 1.spc100.b050, manageone 8.0.1, manageone 8.0.0, manageone 6.5.1.1.b040, manageone 6.5.1.1.b030, manageone 6.5.1.1.b020, manageone 6.5.1.1.b010, manageone 6.5.rc2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202102-0639", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "6.5.1.1", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "8.0.0", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "6.5.1", }, { model: "imaster mae-m", scope: "eq", trust: 1, vendor: "huawei", version: "v100r020c10spc220", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "8.0.1", }, { model: "manageone", scope: "eq", trust: 1, vendor: "huawei", version: "6.5.0", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c00", }, { model: "network functions virtualization fusionsphere", scope: "eq", trust: 1, vendor: "huawei", version: "6.5.1", }, { model: "imaster mae-m", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "manageone", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "nfv fusionsphere", scope: null, trust: 0.8, vendor: "huawei", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:huawei:imaster_mae-m:v100r020c10spc220:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.0:rc2.b050:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.0:spc100.b210:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc1.b060:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b020:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b030:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b040:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b050:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b060:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b070:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b080:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b090:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc100.b050:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b010:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b040:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b010:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b030:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b040:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b050:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b060:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b070:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1.1:b010:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1.1:b020:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1.1:b030:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:6.5.1.1:b040:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.b041:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc12:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc23:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-22299", }, ], }, cve: "CVE-2021-22299", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 4.6, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2021-22299", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "VHN-380734", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2021-22299", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-22299", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202101-1629", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-380734", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-380734", }, { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, { db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220. plural Huawei The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Several Huawei products have a security vulnerability, which stems from the application not properly imposing security restrictions, resulting in bypassing security restrictions and privilege escalation. The following devices or models have this vulnerability: manageone 8.0.rc3.spc100, manageone 8.0.rc3.b041, manageone 8.0.rc3, manageone 8.0.0.spc100, manageone 8.0.0-lcnd81, manageone 6.5.1rc2.b030, manageone 6.5 .1rc2.b020, manageone 6.5.1rc1.b060, manageone 6.5.0.spc100.b210, manageone 8.0.rc2, manageone 6.5.1rc2.b090, manageone 6.5.1rc2.b080, manageone 6.5.1rc2.b070, manageone 6.5. 1rc2.b060, manageone 6.5.1rc2.b050, manageone 6.5.1rc2.b040, manageone 6.5.1.spc200.b070, manageone 6.5.1.spc200.b060, manageone 6.5.1.spc200.b050, manageone 6.5.1. spc200.b040, manageone 6.5.1.spc200.b030, manageone 6.5.1.spc200.b010, manageone 6.5.1.spc200, manageone 6.5.1.spc101.b040, manageone 6.5.1.spc101.b010, manageone 6.5. 1.spc100.b050, manageone 8.0.1, manageone 8.0.0, manageone 6.5.1.1.b040, manageone 6.5.1.1.b030, manageone 6.5.1.1.b020, manageone 6.5.1.1.b010, manageone 6.5.rc2", sources: [ { db: "NVD", id: "CVE-2021-22299", }, { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "VULHUB", id: "VHN-380734", }, { db: "VULMON", id: "CVE-2021-22299", }, ], trust: 1.8, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-22299", trust: 2.6, }, { db: "JVNDB", id: "JVNDB-2021-003367", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202101-1629", trust: 0.7, }, { db: "VULHUB", id: "VHN-380734", trust: 0.1, }, { db: "VULMON", id: "CVE-2021-22299", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-380734", }, { db: "VULMON", id: "CVE-2021-22299", }, { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, { db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, id: "VAR-202102-0639", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-380734", }, ], trust: 0.01, }, last_update_date: "2023-12-18T11:57:34.193000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20210120-02-privilege", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, { title: "Huawei Various product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139879", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "Improper authority management (CWE-269) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22299", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210120-02-privilege-cn", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/195350", }, ], sources: [ { db: "VULHUB", id: "VHN-380734", }, { db: "VULMON", id: "CVE-2021-22299", }, { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, { db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-380734", }, { db: "VULMON", id: "CVE-2021-22299", }, { db: "JVNDB", id: "JVNDB-2021-003367", }, { db: "NVD", id: "CVE-2021-22299", }, { db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-02-06T00:00:00", db: "VULHUB", id: "VHN-380734", }, { date: "2021-02-06T00:00:00", db: "VULMON", id: "CVE-2021-22299", }, { date: "2021-10-25T00:00:00", db: "JVNDB", id: "JVNDB-2021-003367", }, { date: "2021-02-06T02:15:12.680000", db: "NVD", id: "CVE-2021-22299", }, { date: "2021-01-20T00:00:00", db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-07-12T00:00:00", db: "VULHUB", id: "VHN-380734", }, { date: "2021-02-11T00:00:00", db: "VULMON", id: "CVE-2021-22299", }, { date: "2021-10-25T08:30:00", db: "JVNDB", id: "JVNDB-2021-003367", }, { date: "2022-07-12T17:42:04.277000", db: "NVD", id: "CVE-2021-22299", }, { date: "2022-07-14T00:00:00", db: "CNNVD", id: "CNNVD-202101-1629", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202101-1629", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product permission management vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2021-003367", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202101-1629", }, ], trust: 0.6, }, }
var-201504-0247
Vulnerability from variot
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. HP Service Manager Software versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2015-2808
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI
d=emr_na-c01345499
RESOLUTION
HPE has made the following mitigation information available to resolve the vulnerability for the impacted versions of HPE Service Manager: https://softw aresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document /KM01566352
For versions 9.30, 9.31, 9.32, 9.33, 9.34 please:
Upgrade to SM 9.35.P4 (recommended) or SM 9.34.P5
SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143332
SM 9.35 HP Itanium Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143206
SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143388
SM 9.35 Linux Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143530
SM 9.35 Solaris Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143276
SM 9.35 Windows Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143589
SM 9.34.P5 package, AIX Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310304
HP Itanium Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02311066
Linux Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310566
Solaris Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02311656
Windows Server 9.34.5003 p5
https://softwaresupport.hpe.com/km/KM02310486
For version 9.35 please:
Upgrade to SM 9.35.P4
SM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143332
SM 9.35 HP Itanium Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143206
SM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143388
SM 9.35 Linux Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143530
SM 9.35 Solaris Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143276
SM 9.35 Windows Server 9.35.4001 p4
https://softwaresupport.hpe.com/km/KM02143589
For version 9.40 please:
Upgrade to SM 9.41.P3
SM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX
https://softwaresupport.hpe.com/km/KM02236813
Service Manager 9.41.3016 p3 - Server for HP-UX/IA
https://softwaresupport.hpe.com/km/KM02236897
Service Manager 9.41.3016 p3 - Server for Linux
https://softwaresupport.hpe.com/km/KM02236827
Service Manager 9.41.3016 p3 - Server for Solaris
https://softwaresupport.hpe.com/km/KM02236843
Service Manager 9.41.3016 p3 - Server for Windows
https://softwaresupport.hpe.com/km/KM02236929
HISTORY Version:1 (rev.1) - 1 July 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04773004
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04773004 Version: 1
HPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification, Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-08-25 Last Updated: 2015-08-25
Potential Security Impact: Remote unauthorized modification, disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Integration Adaptor.
- The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification.
- The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information.
References:
CVE-2015-4000 - "Logjam" CVE-2015-2808 - "Bar Mitzvah" SSRT102214
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Integration Adaptor v9.12.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following mitigation information available to resolve the vulnerability for the impacted versions of HP Integration Adaptor.
Please consult HP Software Support Online (SSO):
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face
tsearch/document/KM01763510?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE
HISTORY Version:1 (rev.1) - 25 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Customers unable to apply the update should contact HPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: RHSA-2015:1230-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1230.html Issue date: 2015-07-15 CVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 CVE-2015-4749 CVE-2015-4760 =====================================================================
- Summary:
Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
- Description:
The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.
Multiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760, CVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)
A flaw was found in the way the Libraries component of OpenJDK verified Online Certificate Status Protocol (OCSP) responses. An OCSP response with no nextUpdate date specified was incorrectly handled as having unlimited validity, possibly causing a revoked X.509 certificate to be interpreted as valid. (CVE-2015-4748)
It was discovered that the JCE component in OpenJDK failed to use constant time comparisons in multiple cases. An attacker could possibly use these flaws to disclose sensitive information by measuring the time used to perform operations using these non-constant time comparisons. (CVE-2015-2601)
A flaw was found in the RC4 encryption algorithm. When using certain keys for RC4 encryption, an attacker could obtain portions of the plain text from the cipher text without the knowledge of the encryption key. (CVE-2015-2808)
Note: With this update, OpenJDK now disables RC4 SSL/TLS cipher suites by default to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug 1207101, linked to in the References section, for additional details about this change.
A flaw was found in the way the TLS protocol composed the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic. (CVE-2015-4000)
Note: This update forces the TLS/SSL client implementation in OpenJDK to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211, linked to in the References section, for additional details about this change.
It was discovered that the JNDI component in OpenJDK did not handle DNS resolutions correctly. An attacker able to trigger such DNS errors could cause a Java application using JNDI to consume memory and CPU time, and possibly block further DNS resolution. (CVE-2015-4749)
Multiple information leak flaws were found in the JMX and 2D components in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)
A flaw was found in the way the JSSE component in OpenJDK performed X.509 certificate identity verification when establishing a TLS/SSL connection to a host identified by an IP address. In certain cases, the certificate was accepted as valid if it was issued for a host name to which the IP address resolves rather than for the IP address. (CVE-2015-2625)
All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1207101 - CVE-2015-2808 SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher 1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks 1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) 1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) 1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) 1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) 1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) 1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) 1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) 1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) 1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) 1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) 1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) 1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm
i386: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm
x86_64: java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-2590 https://access.redhat.com/security/cve/CVE-2015-2601 https://access.redhat.com/security/cve/CVE-2015-2621 https://access.redhat.com/security/cve/CVE-2015-2625 https://access.redhat.com/security/cve/CVE-2015-2628 https://access.redhat.com/security/cve/CVE-2015-2632 https://access.redhat.com/security/cve/CVE-2015-2808 https://access.redhat.com/security/cve/CVE-2015-4000 https://access.redhat.com/security/cve/CVE-2015-4731 https://access.redhat.com/security/cve/CVE-2015-4732 https://access.redhat.com/security/cve/CVE-2015-4733 https://access.redhat.com/security/cve/CVE-2015-4748 https://access.redhat.com/security/cve/CVE-2015-4749 https://access.redhat.com/security/cve/CVE-2015-4760 https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11 https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFVpljRXlSAg2UNWIIRAl93AJ0bTWDExJ3gT6Vf3jj7gLWm1931JQCfSHwy geoA6gBwA56Ep9ZcHnUCxAU= =qQgk -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0247", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "communications application session controller", scope: "lte", trust: 1, vendor: "oracle", version: "3.9.0", }, { model: "sparc enterprise m5000", scope: "gte", trust: 1, vendor: "fujitsu", version: "xcp", }, { model: "s5720ei", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "7.0", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c03", }, { model: "s5720hi", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux server aus", scope: "eq", trust: 1, vendor: "redhat", version: "7.7", }, { model: "linux enterprise server", scope: "eq", trust: 1, vendor: "suse", version: "12", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.5", }, { model: "enterprise linux server aus", scope: "eq", trust: 1, vendor: "redhat", version: "7.3", }, { model: "s5700s-li", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux desktop", scope: "eq", trust: 1, vendor: "redhat", version: "5.0", }, { model: "satellite", scope: "eq", trust: 1, vendor: "redhat", version: "5.6", }, { model: "s6700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux server aus", scope: "eq", trust: 1, vendor: "redhat", version: "7.6", }, { model: "oceanstor cse", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "satellite", scope: "eq", trust: 1, vendor: "redhat", version: "5.7", }, { model: "http server", scope: "eq", trust: 1, vendor: "oracle", version: "11.1.1.9.0", }, { model: "s5700hi", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor s5800t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor s2600t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "cognos metrics manager", scope: "eq", trust: 1, vendor: "ibm", version: "10.1", }, { model: "cognos metrics manager", scope: "eq", trust: 1, vendor: "ibm", version: "10.2", }, { model: "cognos metrics manager", scope: "eq", trust: 1, vendor: "ibm", version: "10.1.1", }, { model: "enterprise linux server aus", scope: "eq", trust: 1, vendor: "redhat", version: "7.4", }, { model: "s12700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "integrated lights out manager", scope: "gte", trust: 1, vendor: "oracle", version: "3.0.0", }, { model: "http server", scope: "eq", trust: 1, vendor: "oracle", version: "12.1.3.0.0", }, { model: "enterprise linux server tus", scope: "eq", trust: 1, vendor: "redhat", version: "7.7", }, { model: "http server", scope: "eq", trust: 1, vendor: "oracle", version: "12.2.1.2.0", }, { model: "enterprise linux server tus", scope: "eq", trust: 1, vendor: "redhat", version: "7.3", }, { model: "linux enterprise server", scope: "eq", trust: 1, vendor: "suse", version: "10", }, { model: "manager", scope: "eq", trust: 1, vendor: "suse", version: "1.7", }, { model: "s5700ei", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "policy center", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "sparc enterprise m3000", scope: "lt", trust: 1, vendor: "fujitsu", version: "xcp_1121", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "6.6", }, { model: "enterprise linux server tus", scope: "eq", trust: 1, vendor: "redhat", version: "7.6", }, { model: "enterprise linux server", scope: "eq", trust: 1, vendor: "redhat", version: "6.0", }, { model: "communications policy management", scope: "lt", trust: 1, vendor: "oracle", version: "9.9.2", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "8.0", }, { model: "cognos metrics manager", scope: "eq", trust: 1, vendor: "ibm", version: "10.2.1", }, { model: "oceanstor replicationdirector", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "linux enterprise server", scope: "eq", trust: 1, vendor: "suse", version: "11", }, { model: "linux enterprise desktop", scope: "eq", trust: 1, vendor: "suse", version: "12", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "12.04", }, { model: "opensuse", scope: "eq", trust: 1, vendor: "opensuse", version: "13.2", }, { model: "sparc enterprise m5000", scope: "lt", trust: 1, vendor: "fujitsu", version: "xcp_1121", }, { model: "sparc enterprise m9000", scope: "gte", trust: 1, vendor: "fujitsu", version: "xcp", }, { model: "http server", scope: "eq", trust: 1, vendor: "oracle", version: "11.1.1.7.0", }, { model: "oceanstor 18800f", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "cognos metrics manager", scope: "eq", trust: 1, vendor: "ibm", version: "10.2.2", }, { model: "enterprise linux workstation", scope: "eq", trust: 1, vendor: "redhat", version: "5.0", }, { model: "oceanstor 18500", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "s7700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "15.04", }, { model: "enterprise linux server", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "enterprise linux desktop", scope: "eq", trust: 1, vendor: "redhat", version: "6.0", }, { model: "opensuse", scope: "eq", trust: 1, vendor: "opensuse", version: "13.1", }, { model: "linux enterprise debuginfo", scope: "eq", trust: 1, vendor: "suse", version: "11", }, { model: "s5700li", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "s2750", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "9700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "s5700si", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c02", }, { model: "linux enterprise software development kit", scope: "eq", trust: 1, vendor: "suse", version: "12", }, { model: "oceanstor 9000", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor s6800t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "s3700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "integrated lights out manager", scope: "lte", trust: 1, vendor: "oracle", version: "3.2.11", }, { model: "quidway s9300", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "communications application session controller", scope: "gte", trust: 1, vendor: "oracle", version: "3.0.0", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.7", }, { model: "integrated lights out manager", scope: "lte", trust: 1, vendor: "oracle", version: "4.0.4", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.3", }, { model: "linux enterprise desktop", scope: "eq", trust: 1, vendor: "suse", version: "11", }, { model: "e6000", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux desktop", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c04", }, { model: "s2700", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "http server", scope: "eq", trust: 1, vendor: "oracle", version: "12.2.1.1.0", }, { model: "sparc enterprise m9000", scope: "lt", trust: 1, vendor: "fujitsu", version: "xcp_1121", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.6", }, { model: "s5710hi", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.4", }, { model: "enterprise linux server aus", scope: "eq", trust: 1, vendor: "redhat", version: "6.6", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.1", }, { model: "sparc enterprise m4000", scope: "lt", trust: 1, vendor: "fujitsu", version: "xcp_1121", }, { model: "sparc enterprise m8000", scope: "lt", trust: 1, vendor: "fujitsu", version: "xcp_1121", }, { model: "e9000", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor s5500t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor s5600t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "integrated lights out manager", scope: "gte", trust: 1, vendor: "oracle", version: "4.0.0", }, { model: "enterprise linux workstation", scope: "eq", trust: 1, vendor: "redhat", version: "6.0", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c01", }, { model: "linux enterprise software development kit", scope: "eq", trust: 1, vendor: "suse", version: "11", }, { model: "oceanstor vis6600t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "s5710ei", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "oceanstor 18800", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "ultravr", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "sparc enterprise m3000", scope: "gte", trust: 1, vendor: "fujitsu", version: "xcp", }, { model: "enterprise linux server", scope: "eq", trust: 1, vendor: "redhat", version: "5.0", }, { model: "policy center", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "enterprise linux eus", scope: "eq", trust: 1, vendor: "redhat", version: "7.2", }, { model: "sparc enterprise m4000", scope: "gte", trust: 1, vendor: "fujitsu", version: "xcp", }, { model: "sparc enterprise m8000", scope: "gte", trust: 1, vendor: "fujitsu", version: "xcp", }, { model: "ubuntu linux", scope: "eq", trust: 1, vendor: "canonical", version: "14.04", }, { model: "oceanstor hvs85t", scope: "eq", trust: 1, vendor: "huawei", version: null, }, { model: "enterprise linux workstation", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: null, }, ], sources: [ { db: "NVD", id: "CVE-2015-2808", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.0.4", versionStartIncluding: "4.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "3.2.11", versionStartIncluding: "3.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "3.9.0", versionStartIncluding: "3.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.9.2", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2015-2808", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "HP", sources: [ { db: "PACKETSTORM", id: "137746", }, { db: "PACKETSTORM", id: "133337", }, { db: "PACKETSTORM", id: "132593", }, { db: "PACKETSTORM", id: "136248", }, ], trust: 0.4, }, cve: "CVE-2015-2808", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-80769", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2015-2808", trust: 1, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-80769", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-80769", }, { db: "NVD", id: "CVE-2015-2808", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue. RC4 is a stream encryption algorithm with variable key length developed by American software developer Ronald Rivest. The algorithm consists of a pseudo-random number generator and an XOR operation, and supports encryption and decryption using the same key. There is a security loophole in the RC4 algorithm used in the TLS protocol and the SSL protocol. The loophole stems from the fact that the program does not correctly combine state data and key data during the initialization phase. A remote attacker can exploit this vulnerability to perform a plaintext-recovery attack on the initialization bytes in the data stream by sniffing specific network traffic and then conducting a brute force attack. \nHP Service Manager Software versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2015-2808\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\n https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docI\nd=emr_na-c01345499\n\nRESOLUTION\n\nHPE has made the following mitigation information available to resolve the\nvulnerability for the impacted versions of HPE Service Manager: https://softw\naresupport.hpe.com/group/softwaresupport/search-result/-/facetsearch/document\n/KM01566352\n\nFor versions 9.30, 9.31, 9.32, 9.33, 9.34 please:\n\nUpgrade to SM 9.35.P4 (recommended) or SM 9.34.P5\n\nSM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143332\n\nSM 9.35 HP Itanium Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143206\n\nSM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143388\n\nSM 9.35 Linux Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143530\n\nSM 9.35 Solaris Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143276\n\nSM 9.35 Windows Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143589\n\nSM 9.34.P5 package, AIX Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310304\n\nHP Itanium Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02311066\n\nLinux Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310566\n\nSolaris Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02311656\n\nWindows Server 9.34.5003 p5\n\nhttps://softwaresupport.hpe.com/km/KM02310486\n\nFor version 9.35 please:\n\nUpgrade to SM 9.35.P4\n\nSM9.35 P4 package, SM 9.35 AIX Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143332\n\nSM 9.35 HP Itanium Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143206\n\nSM 9.35 HP Itanium Server for Oracle 12c 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143388\n\nSM 9.35 Linux Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143530\n\nSM 9.35 Solaris Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143276\n\nSM 9.35 Windows Server 9.35.4001 p4\n\nhttps://softwaresupport.hpe.com/km/KM02143589\n\nFor version 9.40 please:\n\nUpgrade to SM 9.41.P3\n\nSM9.41.P3 package, Service Manager 9.41.3016 p3 - Server for AIX\n\nhttps://softwaresupport.hpe.com/km/KM02236813\n\nService Manager 9.41.3016 p3 - Server for HP-UX/IA\n\nhttps://softwaresupport.hpe.com/km/KM02236897\n\nService Manager 9.41.3016 p3 - Server for Linux\n\nhttps://softwaresupport.hpe.com/km/KM02236827\n\nService Manager 9.41.3016 p3 - Server for Solaris\n\nhttps://softwaresupport.hpe.com/km/KM02236843\n\nService Manager 9.41.3016 p3 - Server for Windows\n\nhttps://softwaresupport.hpe.com/km/KM02236929\n\nHISTORY\nVersion:1 (rev.1) - 1 July 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04773004\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04773004\nVersion: 1\n\nHPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification,\nDisclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-08-25\nLast Updated: 2015-08-25\n\nPotential Security Impact: Remote unauthorized modification, disclosure of\ninformation\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in HP Integration\nAdaptor. \n\n - The TLS vulnerability using US export-grade 512-bit keys in\nDiffie-Hellman key exchange known as \"Logjam\" could be exploited remotely to\nallow unauthorized modification. \n - The RC4 stream cipher vulnerability in SSL/TLS known as \"Bar Mitzvah\"\ncould be exploited remotely to allow disclosure of information. \n\nReferences:\n\nCVE-2015-4000 - \"Logjam\"\nCVE-2015-2808 - \"Bar Mitzvah\"\nSSRT102214\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Integration Adaptor v9.12. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-4000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2015-2808 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following mitigation information available to resolve the\nvulnerability for the impacted versions of HP Integration Adaptor. \n\n Please consult HP Software Support Online (SSO):\n\n https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face\ntsearch/document/KM01763510?lang=en&cc=us&hpappid=113963_OSP_PRO_HPE\n\nHISTORY\nVersion:1 (rev.1) - 25 August 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Customers unable to apply the update should contact\nHPE Support to discuss options. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: java-1.7.0-openjdk security update\nAdvisory ID: RHSA-2015:1230-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-1230.html\nIssue date: 2015-07-15\nCVE Names: CVE-2015-2590 CVE-2015-2601 CVE-2015-2621 \n CVE-2015-2625 CVE-2015-2628 CVE-2015-2632 \n CVE-2015-2808 CVE-2015-4000 CVE-2015-4731 \n CVE-2015-4732 CVE-2015-4733 CVE-2015-4748 \n CVE-2015-4749 CVE-2015-4760 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix multiple security issues are\nnow available for Red Hat Enterprise Linux 5. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. Description:\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime\nEnvironment and the OpenJDK 7 Java Software Development Kit. \n\nMultiple flaws were discovered in the 2D, CORBA, JMX, Libraries and RMI\ncomponents in OpenJDK. An untrusted Java application or applet could use\nthese flaws to bypass certain Java sandbox restrictions. (CVE-2015-4760,\nCVE-2015-2628, CVE-2015-4731, CVE-2015-2590, CVE-2015-4732, CVE-2015-4733)\n\nA flaw was found in the way the Libraries component of OpenJDK verified\nOnline Certificate Status Protocol (OCSP) responses. An OCSP response with\nno nextUpdate date specified was incorrectly handled as having unlimited\nvalidity, possibly causing a revoked X.509 certificate to be interpreted as\nvalid. (CVE-2015-4748)\n\nIt was discovered that the JCE component in OpenJDK failed to use constant\ntime comparisons in multiple cases. An attacker could possibly use these\nflaws to disclose sensitive information by measuring the time used to\nperform operations using these non-constant time comparisons. \n(CVE-2015-2601)\n\nA flaw was found in the RC4 encryption algorithm. When using certain keys\nfor RC4 encryption, an attacker could obtain portions of the plain text\nfrom the cipher text without the knowledge of the encryption key. \n(CVE-2015-2808)\n\nNote: With this update, OpenJDK now disables RC4 SSL/TLS cipher suites by\ndefault to address the CVE-2015-2808 issue. Refer to Red Hat Bugzilla bug\n1207101, linked to in the References section, for additional details about\nthis change. \n\nA flaw was found in the way the TLS protocol composed the Diffie-Hellman\n(DH) key exchange. A man-in-the-middle attacker could use this flaw to\nforce the use of weak 512 bit export-grade keys during the key exchange,\nallowing them do decrypt all traffic. (CVE-2015-4000)\n\nNote: This update forces the TLS/SSL client implementation in OpenJDK to\nreject DH key sizes below 768 bits, which prevents sessions to be\ndowngraded to export-grade keys. Refer to Red Hat Bugzilla bug 1223211,\nlinked to in the References section, for additional details about this\nchange. \n\nIt was discovered that the JNDI component in OpenJDK did not handle DNS\nresolutions correctly. An attacker able to trigger such DNS errors could\ncause a Java application using JNDI to consume memory and CPU time, and\npossibly block further DNS resolution. (CVE-2015-4749)\n\nMultiple information leak flaws were found in the JMX and 2D components in\nOpenJDK. An untrusted Java application or applet could use this flaw to\nbypass certain Java sandbox restrictions. (CVE-2015-2621, CVE-2015-2632)\n\nA flaw was found in the way the JSSE component in OpenJDK performed X.509\ncertificate identity verification when establishing a TLS/SSL connection to\na host identified by an IP address. In certain cases, the certificate was\naccepted as valid if it was issued for a host name to which the IP address\nresolves rather than for the IP address. (CVE-2015-2625)\n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1207101 - CVE-2015-2808 SSL/TLS: \"Invariance Weakness\" vulnerability in RC4 stream cipher\n1223211 - CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks\n1241965 - CVE-2015-2625 OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694)\n1242019 - CVE-2015-2601 OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865)\n1242232 - CVE-2015-2628 OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376)\n1242234 - CVE-2015-4731 OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397)\n1242240 - CVE-2015-4732 OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405)\n1242275 - CVE-2015-4733 OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409)\n1242281 - CVE-2015-4748 OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374)\n1242372 - CVE-2015-2621 OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853)\n1242379 - CVE-2015-4749 OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378)\n1242394 - CVE-2015-2632 ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520)\n1242447 - CVE-2015-4760 ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)\n1243139 - CVE-2015-2590 OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.i386.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.i386.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el5_11.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-2590\nhttps://access.redhat.com/security/cve/CVE-2015-2601\nhttps://access.redhat.com/security/cve/CVE-2015-2621\nhttps://access.redhat.com/security/cve/CVE-2015-2625\nhttps://access.redhat.com/security/cve/CVE-2015-2628\nhttps://access.redhat.com/security/cve/CVE-2015-2632\nhttps://access.redhat.com/security/cve/CVE-2015-2808\nhttps://access.redhat.com/security/cve/CVE-2015-4000\nhttps://access.redhat.com/security/cve/CVE-2015-4731\nhttps://access.redhat.com/security/cve/CVE-2015-4732\nhttps://access.redhat.com/security/cve/CVE-2015-4733\nhttps://access.redhat.com/security/cve/CVE-2015-4748\nhttps://access.redhat.com/security/cve/CVE-2015-4749\nhttps://access.redhat.com/security/cve/CVE-2015-4760\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFVpljRXlSAg2UNWIIRAl93AJ0bTWDExJ3gT6Vf3jj7gLWm1931JQCfSHwy\ngeoA6gBwA56Ep9ZcHnUCxAU=\n=qQgk\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", sources: [ { db: "NVD", id: "CVE-2015-2808", }, { db: "VULHUB", id: "VHN-80769", }, { db: "PACKETSTORM", id: "137746", }, { db: "PACKETSTORM", id: "133337", }, { db: "PACKETSTORM", id: "132593", }, { db: "PACKETSTORM", id: "136248", }, { db: "PACKETSTORM", id: "132698", }, ], trust: 1.44, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://www.scap.org.cn/vuln/vhn-80769", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-80769", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2015-2808", trust: 1.6, }, { db: "BID", id: "91787", trust: 1.1, }, { db: "BID", id: "73684", trust: 1.1, }, { db: "SECTRACK", id: "1032788", trust: 1.1, }, { db: "SECTRACK", id: "1033737", trust: 1.1, }, { db: "SECTRACK", id: "1032734", trust: 1.1, }, { db: "SECTRACK", id: "1033432", trust: 1.1, }, { db: "SECTRACK", id: "1033071", trust: 1.1, }, { db: "SECTRACK", id: "1036222", trust: 1.1, }, { db: "SECTRACK", id: "1032708", trust: 1.1, }, { db: "SECTRACK", id: "1032868", trust: 1.1, }, { db: "SECTRACK", id: "1032990", trust: 1.1, }, { db: "SECTRACK", id: "1033072", trust: 1.1, }, { db: "SECTRACK", id: "1032910", trust: 1.1, }, { db: "SECTRACK", id: "1032858", trust: 1.1, }, { db: "SECTRACK", id: "1032600", trust: 1.1, }, { db: "SECTRACK", id: "1032599", trust: 1.1, }, { db: "SECTRACK", id: "1032707", trust: 1.1, }, { db: "SECTRACK", id: "1033386", trust: 1.1, }, { db: "SECTRACK", id: "1033415", trust: 1.1, }, { db: "SECTRACK", id: "1033431", trust: 1.1, }, { db: "SECTRACK", id: "1033769", trust: 1.1, }, { db: "JUNIPER", id: "JSA10705", trust: 1.1, }, { db: "JUNIPER", id: "JSA10727", trust: 1.1, }, { db: "JUNIPER", id: "JSA10783", trust: 1.1, }, { db: "MCAFEE", id: "SB10163", trust: 1.1, }, { db: "PACKETSTORM", id: "133337", trust: 0.2, }, { db: "PACKETSTORM", id: "137746", trust: 0.2, }, { db: "PACKETSTORM", id: "136248", trust: 0.2, }, { db: "PACKETSTORM", id: "132872", trust: 0.1, }, { db: "PACKETSTORM", id: "132592", trust: 0.1, }, { db: "PACKETSTORM", id: "133330", trust: 0.1, }, { db: "PACKETSTORM", id: "133392", trust: 0.1, }, { db: "PACKETSTORM", id: "132890", trust: 0.1, }, { db: "PACKETSTORM", id: "133336", trust: 0.1, }, { db: "PACKETSTORM", id: "132891", trust: 0.1, }, { db: "PACKETSTORM", id: "133329", trust: 0.1, }, { db: "PACKETSTORM", id: "133391", trust: 0.1, }, { db: "PACKETSTORM", id: "132753", trust: 0.1, }, { db: "PACKETSTORM", id: "135172", trust: 0.1, }, { db: "PACKETSTORM", id: "133344", trust: 0.1, }, { db: "PACKETSTORM", id: "136773", trust: 0.1, }, { db: "PACKETSTORM", id: "133366", trust: 0.1, }, { db: "PACKETSTORM", id: "132345", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201503-654", trust: 0.1, }, { db: "VULHUB", id: "VHN-80769", trust: 0.1, }, { db: "PACKETSTORM", id: "132593", trust: 0.1, }, { db: "PACKETSTORM", id: "132698", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-80769", }, { db: "PACKETSTORM", id: "137746", }, { db: "PACKETSTORM", id: "133337", }, { db: "PACKETSTORM", id: "132593", }, { db: "PACKETSTORM", id: "136248", }, { db: "PACKETSTORM", id: "132698", }, { db: "NVD", id: "CVE-2015-2808", }, ], }, id: "VAR-201504-0247", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-80769", }, ], trust: 0.6578776233333333, }, last_update_date: "2024-07-23T20:58:53.769000Z", problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-327", trust: 1, }, { problemtype: "CWE-310", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-80769", }, { db: "NVD", id: "CVE-2015-2808", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.2, url: "http://rhn.redhat.com/errata/rhsa-2015-1230.html", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71888", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg1iv71892", }, { trust: 1.1, url: "http://www.securityfocus.com/bid/73684", }, { trust: 1.1, url: "http://www.securityfocus.com/bid/91787", }, { trust: 1.1, url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04779034", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { trust: 1.1, url: "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", }, { trust: 1.1, url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", }, { trust: 1.1, url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { trust: 1.1, url: "http://www.huawei.com/en/psirt/security-advisories/hw-454055", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { trust: 1.1, url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04770140", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04772190", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773119", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773241", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04773256", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04832246", }, { trust: 1.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04926789", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04708650", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04711380", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05085988", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05193347", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05289935", }, { trust: 1.1, url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05336888", }, { trust: 1.1, url: "https://kb.juniper.net/jsa10783", }, { trust: 1.1, url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098709", }, { trust: 1.1, url: "http://www.debian.org/security/2015/dsa-3316", }, { trust: 1.1, url: "http://www.debian.org/security/2015/dsa-3339", }, { trust: 1.1, url: "https://security.gentoo.org/glsa/201512-10", }, { trust: 1.1, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04687922", }, { trust: 1.1, url: "https://www.blackhat.com/docs/asia-15/materials/asia-15-mantin-bar-mitzvah-attack-breaking-ssl-with-13-year-old-rc4-weakness-wp.pdf", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1006.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1007.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1020.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1021.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1091.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1228.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1229.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1241.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1242.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1243.html", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2015-1526.html", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032599", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032600", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032707", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032708", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032734", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032788", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032858", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032868", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032910", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1032990", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033071", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033072", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033386", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033415", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033431", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033432", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033737", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1033769", }, { trust: 1.1, url: "http://www.securitytracker.com/id/1036222", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { trust: 1.1, url: "http://www.ubuntu.com/usn/usn-2696-1", }, { trust: 1.1, url: "http://www.ubuntu.com/usn/usn-2706-1", }, { trust: 1, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10705", }, { trust: 1, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10727", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { trust: 1, url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { trust: 1, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10163", }, { trust: 1, url: "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2808", }, { trust: 0.2, url: "http://www.hpe.com/support/security_bulletin_archive", }, { trust: 0.2, url: "http://www.hpe.com/support/subscriber_choice", }, { trust: 0.2, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n", }, { trust: 0.2, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/", }, { trust: 0.2, url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4000", }, { trust: 0.2, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea", }, { trust: 0.1, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10705", }, { trust: 0.1, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10727", }, { trust: 0.1, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10163", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02236843", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02236813", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143530", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143589", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143332", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02310486", }, { trust: 0.1, url: "https://softw", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02236827", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02310566", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02310304", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143206", }, { trust: 0.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?doci", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143388", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02311066", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02236897", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02143276", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02311656", }, { trust: 0.1, url: "https://softwaresupport.hpe.com/km/km02236929", }, { trust: 0.1, url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/", }, { trust: 0.1, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/face", }, { trust: 0.1, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2802", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4732", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4760", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2621", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2628", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2601", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4732", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4760", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2601", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4000", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2632", }, { trust: 0.1, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1207101#c11", }, { trust: 0.1, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2632", }, { trust: 0.1, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1223211#c33", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2621", }, { trust: 0.1, url: "https://access.redhat.com/articles/11258", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4733", }, { trust: 0.1, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.1, url: "https://www.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4748", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4731", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2625", }, { trust: 0.1, url: "https://bugzilla.redhat.com/):", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2625", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-4749", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2590", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2808", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4733", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4749", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2590", }, { trust: 0.1, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4731", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-4748", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-2628", }, ], sources: [ { db: "VULHUB", id: "VHN-80769", }, { db: "PACKETSTORM", id: "137746", }, { db: "PACKETSTORM", id: "133337", }, { db: "PACKETSTORM", id: "132593", }, { db: "PACKETSTORM", id: "136248", }, { db: "PACKETSTORM", id: "132698", }, { db: "NVD", id: "CVE-2015-2808", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-80769", }, { db: "PACKETSTORM", id: "137746", }, { db: "PACKETSTORM", id: "133337", }, { db: "PACKETSTORM", id: "132593", }, { db: "PACKETSTORM", id: "136248", }, { db: "PACKETSTORM", id: "132698", }, { db: "NVD", id: "CVE-2015-2808", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-04-01T00:00:00", db: "VULHUB", id: "VHN-80769", }, { date: "2016-07-01T17:05:00", db: "PACKETSTORM", id: "137746", }, { date: "2015-08-26T23:41:29", db: "PACKETSTORM", id: "133337", }, { date: "2015-07-08T00:35:28", db: "PACKETSTORM", id: "132593", }, { date: "2016-03-15T13:14:00", db: "PACKETSTORM", id: "136248", }, { date: "2015-07-16T17:45:39", db: "PACKETSTORM", id: "132698", }, { date: "2015-04-01T02:00:35.097000", db: "NVD", id: "CVE-2015-2808", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-01-18T00:00:00", db: "VULHUB", id: "VHN-80769", }, { date: "2023-09-07T17:15:37.500000", db: "NVD", id: "CVE-2015-2808", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "136248", }, ], trust: 0.1, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "HP Security Bulletin HPSBGN03627 1", sources: [ { db: "PACKETSTORM", id: "137746", }, ], trust: 0.1, }, }
var-201711-1028
Vulnerability from variot
Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module. Multiple Huawei products are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Huawei SMC2.0 is a set of video management solutions of China Huawei (Huawei). The solution supports H.323 and SIP two mainstream protocols at the same time, and supports the access of devices such as computers and mobile phones. The following versions are affected: Huawei SMC2.0 V100R003C10 Version, V100R005C00SPC100 Version, V100R005C00SPC101B001T Version, V100R005C00SPC102 Version, V100R005C00SPC103 Version, V100R005C00SPC200 Version, V100R005C00SPC201T Version, V500R002C00 Version, V600R006C00 Version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-1028", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r003c10", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc100", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc101b001t", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc102", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc103", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc200", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v100r005c00spc201t", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v500r002c00", }, { model: "smc2.0", scope: "eq", trust: 2.4, vendor: "huawei", version: "v600r006c00", }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc201t", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc200", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc103", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc102", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc100", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00spc300", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00spcc00", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, ], sources: [ { db: "BID", id: "100350", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2017-8213", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei", sources: [ { db: "CNNVD", id: "CNNVD-201707-653", }, ], trust: 0.6, }, cve: "CVE-2017-8213", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8213", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-116416", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 1.4, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "Low", baseScore: 5.3, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2017-8213", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2017-8213", trust: 1.8, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201707-653", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-116416", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-116416", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. Huawei SMC2.0 is a set of video management solutions of China Huawei (Huawei). The solution supports H.323 and SIP two mainstream protocols at the same time, and supports the access of devices such as computers and mobile phones. The following versions are affected: Huawei SMC2.0 V100R003C10 Version, V100R005C00SPC100 Version, V100R005C00SPC101B001T Version, V100R005C00SPC102 Version, V100R005C00SPC103 Version, V100R005C00SPC200 Version, V100R005C00SPC201T Version, V500R002C00 Version, V600R006C00 Version", sources: [ { db: "NVD", id: "CVE-2017-8213", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "BID", id: "100350", }, { db: "VULHUB", id: "VHN-116416", }, ], trust: 1.98, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-8213", trust: 2.8, }, { db: "JVNDB", id: "JVNDB-2017-010590", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201707-653", trust: 0.7, }, { db: "BID", id: "100350", trust: 0.4, }, { db: "VULHUB", id: "VHN-116416", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-116416", }, { db: "BID", id: "100350", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, id: "VAR-201711-1028", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-116416", }, ], trust: 0.9281452777777778, }, last_update_date: "2023-12-18T12:19:18.992000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20170705-01-tls", trust: 0.8, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, { title: "Huawei SMC2.0 Enter the fix for the verification vulnerability", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71751", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-295", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-116416", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8213", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2017-8213", }, { trust: 0.3, url: "http://www.huawei.com/en/", }, { trust: 0.3, url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170705-01-tls-en", }, ], sources: [ { db: "VULHUB", id: "VHN-116416", }, { db: "BID", id: "100350", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-116416", }, { db: "BID", id: "100350", }, { db: "JVNDB", id: "JVNDB-2017-010590", }, { db: "NVD", id: "CVE-2017-8213", }, { db: "CNNVD", id: "CNNVD-201707-653", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-11-22T00:00:00", db: "VULHUB", id: "VHN-116416", }, { date: "2017-07-05T00:00:00", db: "BID", id: "100350", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010590", }, { date: "2017-11-22T19:29:05.477000", db: "NVD", id: "CVE-2017-8213", }, { date: "2017-07-17T00:00:00", db: "CNNVD", id: "CNNVD-201707-653", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2017-12-08T00:00:00", db: "VULHUB", id: "VHN-116416", }, { date: "2017-07-05T00:00:00", db: "BID", id: "100350", }, { date: "2017-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2017-010590", }, { date: "2017-12-08T18:40:37.180000", db: "NVD", id: "CVE-2017-8213", }, { date: "2017-07-17T00:00:00", db: "CNNVD", id: "CNNVD-201707-653", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201707-653", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei SMC2.0 Certificate validation vulnerability in other software", sources: [ { db: "JVNDB", id: "JVNDB-2017-010590", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation", sources: [ { db: "CNNVD", id: "CNNVD-201707-653", }, ], trust: 0.6, }, }
var-202007-0477
Vulnerability from variot
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200 and others are all enterprise routers of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0477", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "secospace usg6300 v500r001c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v100r001c10", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v500r002c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "te60 v600r006c00", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c50", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c30", scope: null, trust: 1.2, vendor: "huawei", version: null, }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc800", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400b001", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcf00", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp16", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c12", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcc00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp02", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc201t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc206t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc102t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc400", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc209t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc702t", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100b015t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc701t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc300", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc400", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc600", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd01t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc200", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcj00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spci00", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp04", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd04t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900t", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc103t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc201b023t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc100", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc200t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400t", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc207t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc404t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd05t", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03b013sp03", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spca00", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spch00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "svn5800-c", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph309", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc700", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc402t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc104t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spcb00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101tb015", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "tp3206", scope: "eq", trust: 1, vendor: "huawei", version: "v100r002c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc200", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc300", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc100", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10spc300", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc206t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc900", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc500", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc502", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc203t", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03lgwl01spc100b012", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca02t", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc800", }, { model: "usg9520", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc800pwe", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spca00", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcc00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc202b025t", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc401t", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00spc200", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc700", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc201t", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc403t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc500", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc205t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc405t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc203t", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc300", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc400", }, { model: "rse6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc102", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc700t", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar1200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc300", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1910", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc100", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc301t", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "usg9560", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c20spc300", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01spc400", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc100", }, { model: "ar120-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce00", }, { model: "dp300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd03t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spce01t", }, { model: "espace u1911", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc700", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc800", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph702", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc180t", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc900", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc204t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "srg3300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc100", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "nip6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc100", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c01sph703", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc900", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc208t", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb01t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c11", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "nip6800", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "te30", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c02spc200", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00t", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16pwe", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ar200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "ar150-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc600", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc600", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc001t", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "ar160", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200t", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc200", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c16", }, { model: "svn5800", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00", }, { model: "espace u1930", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20sph703", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c10", }, { model: "svn5600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c10", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00spc900", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b012sp15", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc101", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc200", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c10", }, { model: "te50", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcg00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc103", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "espace u1981", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc300", }, { model: "nip6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc400", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc100", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca00t", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20lcrw01t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spcc00", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc300", }, { model: "espace u1960", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c30", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c01spc500t", }, { model: "srg1300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c00", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd02t", }, { model: "viewpoint 8660", scope: "eq", trust: 1, vendor: "huawei", version: "v100r008c03spc400", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c00spc500", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc901t", }, { model: "netengine16ex", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc703t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c17", }, { model: "secospace usg6500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "srg2300", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r003c00spc300t", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c15", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c20", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spca00", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10spc600", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spc200b022t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10t", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v100r005c00spc101b001t", }, { model: "te60", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcb00", }, { model: "espace u1980", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20spc500t", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01t", }, { model: "semg9811", scope: "eq", trust: 1, vendor: "huawei", version: "v300r001c01spc500t", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c10", }, { model: "usg9500", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c30", }, { model: "te40", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spc600", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "ar1200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c13", }, { model: "ar510", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c30", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c10spc100", }, { model: "ar150", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c00", }, { model: "ar2200-s", scope: "eq", trust: 1, vendor: "huawei", version: "v200r006c10", }, { model: "secospace usg6300", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spcd00", }, { model: "ips module", scope: "eq", trust: 1, vendor: "huawei", version: "v500r001c50", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c03b015sp03", }, { model: "viewpoint 9030", scope: "eq", trust: 1, vendor: "huawei", version: "v100r011c02spc100", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c02spc300t", }, { model: "ar3200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v200r001c30spca01", }, { model: "ngfw module", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c30", }, { model: "softco", scope: "eq", trust: 1, vendor: "huawei", version: "v200r003c20", }, { model: "ar2200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c02", }, { model: "secospace usg6600", scope: "eq", trust: 1, vendor: "huawei", version: "v100r001c00", }, { model: "ar3600", scope: "eq", trust: 1, vendor: "huawei", version: "v200r008c20", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00spcd00", }, { model: "ar200", scope: "eq", trust: 1, vendor: "huawei", version: "v200r007c01", }, { model: "vp9660", scope: "eq", trust: 1, vendor: "huawei", version: "v500r002c00t", }, { model: "ar120-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar1200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar150-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar160", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ar2200-s", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "ips module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "dp300 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc102", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc103", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v100r005c00spc201t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "smc2.0 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "tp3206 v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "rse6500 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v600r006c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v500r002c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar120-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar1200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar160 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar200-s v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c16pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r006c11", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3200 v200r008c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c12", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c13", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c15", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c16", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r006c17", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "netengine16ex v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg1300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r007c02", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg2300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "srg3300 v200r008c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar2200-s v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v500r002c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6300 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6800 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5600 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800-c v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "svn5800 v200r003c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6300 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9500 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te30 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te40 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te50 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r006c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c01", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r008c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar3600 v200r007c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ips module v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ngfw module v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c10", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6600 v100r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v600r006c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc800", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spca00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v500r002c00spcb00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c01spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "te60 v100r001c10spc800", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "secospace usg6500 v500r001c50", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "nip6800 v500r001c30", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar510 v200r007c00spc900", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "ar150-s v200r006c10spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc500t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spc700", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "semg9811 v300r001c01spca00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01spc600", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r001c01sph703", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "softco v200r003c00spc500", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9520 v300r001c01spc800pwe", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "usg9560 v300r001c20spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc200", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc300", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc300t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c02spc400", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc100", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc100b015t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc101", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc101tb015", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "vp9660 v200r001c30spc102t", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-19416", }, ], }, cve: "CVE-2019-19416", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015760", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2020-46470", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015760", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-19416", trust: 1, value: "HIGH", }, { author: "NVD", id: "JVNDB-2019-015760", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-46470", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202007-387", trust: 0.6, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, { db: "CNNVD", id: "CNNVD-202007-387", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en. plural Huawei The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. Huawei AR1200 and others are all enterprise routers of China's Huawei (Huawei) company", sources: [ { db: "NVD", id: "CVE-2019-19416", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "CNVD", id: "CNVD-2020-46470", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-19416", trust: 3, }, { db: "JVNDB", id: "JVNDB-2019-015760", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-46470", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202007-387", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, { db: "CNNVD", id: "CNNVD-202007-387", }, ], }, id: "VAR-202007-0477", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, ], trust: 1.5382291619576718, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, ], }, last_update_date: "2023-12-18T14:04:40.724000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200115-01-sip", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { title: "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-46470)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/230839", }, { title: "Multiple Huawei Product input verification error vulnerability fixes", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=123634", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "CNNVD", id: "CNNVD-202007-387", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.8, }, { problemtype: "CWE-119", trust: 1, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19416", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19416", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200115-01-sip-cn", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, { db: "CNNVD", id: "CNNVD-202007-387", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-46470", }, { db: "JVNDB", id: "JVNDB-2019-015760", }, { db: "NVD", id: "CVE-2019-19416", }, { db: "CNNVD", id: "CNNVD-202007-387", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-08-17T00:00:00", db: "CNVD", id: "CNVD-2020-46470", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015760", }, { date: "2020-07-08T17:15:09.577000", db: "NVD", id: "CVE-2019-19416", }, { date: "2020-07-08T00:00:00", db: "CNNVD", id: "CNNVD-202007-387", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-08-17T00:00:00", db: "CNVD", id: "CNVD-2020-46470", }, { date: "2020-08-18T00:00:00", db: "JVNDB", id: "JVNDB-2019-015760", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2019-19416", }, { date: "2020-07-14T00:00:00", db: "CNNVD", id: "CNNVD-202007-387", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202007-387", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Product input verification vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2019-015760", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-202007-387", }, ], trust: 0.6, }, }
var-202101-0997
Vulnerability from variot
There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products. SMC2.0 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Mate 30 is a smart phone of China's Huawei (Huawei) company.
Huawei Mate 30 has a buffer overflow vulnerability, which can be exploited by attackers by sending carefully crafted packets with specific parameters to the target device. Due to insufficient verification of the parameters, a successful attack may cause abnormal device behavior
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0997", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc601", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c10", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc500", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc700", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spcc00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc600", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc602", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spce00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spcb00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spcd00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00spc800", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c00spc700", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r006c10spca00", }, { model: "smc2.0", scope: "eq", trust: 1, vendor: "huawei", version: "v600r019c00", }, { model: "smc2.0", scope: "eq", trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "smc2.0", scope: "eq", trust: 0.8, vendor: "huawei", version: "smc2.0 firmware", }, { model: "mate", scope: "eq", trust: 0.6, vendor: "huawei", version: "30", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc500:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc600:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc601:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc602:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc700:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc800:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spca00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcb00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcc00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcd00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spce00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-9209", }, ], }, cve: "CVE-2020-9209", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 4.6, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2020-9209", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.9, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "CNVD-2021-05397", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 6.7, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2020-9209", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-9209", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2021-05397", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202012-1884", trust: 0.6, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2020-9209", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "VULMON", id: "CVE-2020-9209", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, { db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products. SMC2.0 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Mate 30 is a smart phone of China's Huawei (Huawei) company. \n\r\n\r\nHuawei Mate 30 has a buffer overflow vulnerability, which can be exploited by attackers by sending carefully crafted packets with specific parameters to the target device. Due to insufficient verification of the parameters, a successful attack may cause abnormal device behavior", sources: [ { db: "NVD", id: "CVE-2020-9209", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "CNVD", id: "CNVD-2021-05397", }, { db: "VULMON", id: "CVE-2020-9209", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-9209", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2020-015377", trust: 0.8, }, { db: "CNVD", id: "CNVD-2021-05397", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202012-1884", trust: 0.6, }, { db: "VULMON", id: "CVE-2020-9209", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "VULMON", id: "CVE-2020-9209", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, { db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, id: "VAR-202101-0997", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, ], trust: 1.26765326, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, ], }, last_update_date: "2023-12-18T13:23:00.661000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20201230-01-pe", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, { title: "Patch for Huawei Mate 30 buffer overflow vulnerability (CNVD-2021-05397)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/245158", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-862", trust: 1, }, { problemtype: "Lack of authentication (CWE-862) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-9209", }, { trust: 1.7, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20201230-01-pe-cn", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/269.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "VULMON", id: "CVE-2020-9209", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, { db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2021-05397", }, { db: "VULMON", id: "CVE-2020-9209", }, { db: "JVNDB", id: "JVNDB-2020-015377", }, { db: "NVD", id: "CVE-2020-9209", }, { db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-01-22T00:00:00", db: "CNVD", id: "CNVD-2021-05397", }, { date: "2021-01-13T00:00:00", db: "VULMON", id: "CVE-2020-9209", }, { date: "2021-09-17T00:00:00", db: "JVNDB", id: "JVNDB-2020-015377", }, { date: "2021-01-13T23:15:13.807000", db: "NVD", id: "CVE-2020-9209", }, { date: "2020-12-30T00:00:00", db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-01-23T00:00:00", db: "CNVD", id: "CNVD-2021-05397", }, { date: "2021-01-19T00:00:00", db: "VULMON", id: "CVE-2020-9209", }, { date: "2021-09-17T07:58:00", db: "JVNDB", id: "JVNDB-2020-015377", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2020-9209", }, { date: "2021-01-21T00:00:00", db: "CNNVD", id: "CNNVD-202012-1884", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202012-1884", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "SMC2.0 Vulnerability in Microsoft", sources: [ { db: "JVNDB", id: "JVNDB-2020-015377", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202012-1884", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19416", lastModified: "2024-11-21T04:34:44.310", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.577", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:imaster_mae-m:v100r020c10spc220:*:*:*:*:*:*:*", matchCriteriaId: "3F67A4BC-9424-458A-A24B-2AFF301329C4", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.0:-:*:*:*:*:*:*", matchCriteriaId: "F14B3716-7A94-42C5-AE2C-9F64C15A43EC", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.0:rc2.b050:*:*:*:*:*:*", matchCriteriaId: "E514234B-1DB4-4170-BC73-510058ED5788", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.0:spc100.b210:*:*:*:*:*:*", matchCriteriaId: "1F587216-1355-4DD6-83E2-27CCE4ACC2E0", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:-:*:*:*:*:*:*", matchCriteriaId: "CAE8F0E3-8BCA-4059-9BE1-A7BDFD18531A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc1.b060:*:*:*:*:*:*", matchCriteriaId: "24872541-A493-48BD-AA2C-7A976FF75F9D", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b020:*:*:*:*:*:*", matchCriteriaId: "61EC963F-1160-43D4-B4E4-2CC2B209B4DA", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b030:*:*:*:*:*:*", matchCriteriaId: "2B7820BE-0307-40F3-A7BD-66D5B8C7A0A6", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b040:*:*:*:*:*:*", matchCriteriaId: "AD086E38-D1F5-4160-A7A2-12E681F686CB", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b050:*:*:*:*:*:*", matchCriteriaId: "035E4DF1-4B17-448B-8A78-CD81F68D38CA", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b060:*:*:*:*:*:*", matchCriteriaId: "DDDB5BDF-9760-4EE6-947D-A633B9CC0D36", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b070:*:*:*:*:*:*", matchCriteriaId: "31787857-76F6-4E80-82B7-56B1C12B6628", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b080:*:*:*:*:*:*", matchCriteriaId: "3495FF32-2906-4064-A636-64EB3A06421D", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:rc2.b090:*:*:*:*:*:*", matchCriteriaId: "73901E08-8C24-46FB-A42D-6457630AA6DC", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc100.b050:*:*:*:*:*:*", matchCriteriaId: "A472E9AA-784F-4AE2-B1D8-6C77EA1664B7", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b010:*:*:*:*:*:*", matchCriteriaId: "F7CC07B4-FBF6-4AC9-8C54-B7845A068BBC", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc101.b040:*:*:*:*:*:*", matchCriteriaId: "36904A81-9DCD-4E65-ADC1-A5A96FA0D939", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*", matchCriteriaId: "481FA740-3E71-443D-99DF-89CA198951A2", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b010:*:*:*:*:*:*", matchCriteriaId: "37636652-DC9E-4310-AB33-1C67B85A7BF7", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b030:*:*:*:*:*:*", matchCriteriaId: "C462984C-407A-4D52-BEDD-7E300482E2AF", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b040:*:*:*:*:*:*", matchCriteriaId: "154A70F1-C15A-41B1-97B8-89550595BF44", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b050:*:*:*:*:*:*", matchCriteriaId: "B58D9F18-F7B5-4514-978D-EC419614F521", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b060:*:*:*:*:*:*", matchCriteriaId: "BD51B07E-213B-4D32-A121-E2FD124EA1A0", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200.b070:*:*:*:*:*:*", matchCriteriaId: "7926B343-242E-414B-B573-84DB16A2FCBB", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1.1:b010:*:*:*:*:*:*", matchCriteriaId: "463A4059-55EF-4862-B8AD-90DCAC0CC871", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1.1:b020:*:*:*:*:*:*", matchCriteriaId: "4042FC49-4FC7-46B4-8D14-ECACF22A9860", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1.1:b030:*:*:*:*:*:*", matchCriteriaId: "A4D8799F-9ADD-442F-BC39-4BCAFBFFBE2B", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:6.5.1.1:b040:*:*:*:*:*:*", matchCriteriaId: "535597A4-29C8-44A8-9008-4F4E10030531", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*", matchCriteriaId: "EFA5EBB8-C174-4CF0-ADE6-15B62C10DD86", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*", matchCriteriaId: "E9090F1E-EF60-4E54-9885-7F6B1681DE9A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "51E51969-9D4D-4A58-BEBD-19F4BD64BC7A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*", matchCriteriaId: "2A1E9FF8-C0A4-47A5-9738-4D0ADB35DAF6", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.b041:*:*:*:*:*:*", matchCriteriaId: "1B552573-DB7A-4454-A832-AE1811A9577C", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*", matchCriteriaId: "5D17BA55-6032-4BC4-BEB3-4FB27BA81777", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*", matchCriteriaId: "7EDE7C94-7E89-45E6-8A79-32E53D9139DB", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*", matchCriteriaId: "47A8E919-FAC0-4011-927F-599AA7688A32", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc12:*:*:*:*:*:*", matchCriteriaId: "BD187FC7-B1BE-4BF1-BB6E-AA05CEFE4910", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:network_functions_virtualization_fusionsphere:6.5.1:spc23:*:*:*:*:*:*", matchCriteriaId: "1FBB7636-4E6E-4621-9F42-9CDC8EB472F3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*", matchCriteriaId: "C2DC0656-EE97-43AF-9499-7ED8E31D6458", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*", matchCriteriaId: "C32980F5-E091-4B2F-A8D3-F30367C8B9C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220.", }, { lang: "es", value: "Se presenta una vulnerabilidad de escalada de privilegios local en algunos productos Huawei. Un atacante autentificado local podría diseñar comandos específicos para explotar esta vulnerabilidad. Una explotación con éxito puede hacer que un atacante obtenga un mayor privilegio. Las versiones de producto afectadas incluyen: ManageOne versiones 6.5.0, 6.5.0.SPC100.B210, 6.5.1.1.B010, 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, 6.5.1.SPC100.B050, 6.5.1.SPC101.B010, 6.5.1.SPC101.B040, 6.5.1.SPC200, 6.5.1.SPC200.B010, 6.5.1.SPC200.B030, 6.5.1.SPC200.B040, 6.5.1 .SPC200.B050, 6.5.1.SPC200.B060, 6.5.1.SPC200.B070, 6.5.1RC1.B060, 6.5.1RC2.B020, 6.5.1RC2.B030, 6.5.1RC2.B040, 6.5.1RC2.B050, 6.5.1RC2.B060, 6.5.1RC2.B070, 6.5.1RC2.B080, 6.5.1RC2.B090, 6.5.RC2.B050, 8.0.0, 8.0.0-LCND81, 8.0.0.SPC100, 8.0.1, 8.0.RC2, 8.0.RC3, 8.0.RC3.B041, 8.0.RC3.SPC100; NFV_FusionSphere versiones 6.5.1.SPC23, 8.0.0.SPC12; SMC2.0 versiones V600R019C00, V600R019C10; iMaster MAE-M versiones MAE-TOOL (FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220", }, ], id: "CVE-2021-22299", lastModified: "2024-11-21T05:49:52.027", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-02-06T02:15:12.680", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210120-02-privilege-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a la verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19415", lastModified: "2024-11-21T04:34:43.987", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.513", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.", }, { lang: "es", value: "AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de lectura fuera de límites. A causa de una validación de entradas insuficiente, un atacante remoto autenticado podría enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotación exitosa de esta vulnerabilidad podría provocar una lectura fuera de límites y el cierre inesperado del sistema.", }, ], id: "CVE-2017-8163", lastModified: "2024-11-21T03:33:26.833", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-22T19:29:03.803", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "D81E2517-263C-4B59-9D28-A3DE98289B24", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*", matchCriteriaId: "1F8934C1-9162-4C52-A0FC-6B2914E93304", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "4045CC4E-3B44-4E32-A04F-39C8572921B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "EE7D76DA-E30F-4071-807B-DED30596CD45", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "6ABEF8DE-D6CA-45DD-B10E-C3FFB5B82FE7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "75A87025-03BE-4671-9687-85510E9AE4C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "0325B983-F920-4006-8F3B-738B1B4EBEAF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "F159E208-A535-4B5E-A7A5-791EB01C0839", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*", matchCriteriaId: "36DE9947-C096-4B7F-8F3E-748DEFC677C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "6DA92D38-95BA-4FEB-9A5E-A2604B97B6A0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "272E6F06-9FAF-421B-8E87-7F1F1705B598", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "7FE26EE9-2331-4D72-96CF-635A0A4EBE3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "4CA6C55E-DF1F-475D-B1E9-C09CF8278276", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "2AEB5929-1526-4910-BE22-07FCDDA06D0B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "5C4D77D6-4CCA-45A3-8B8F-2A2E3AD82753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E58D7203-2EE3-412A-B39C-94D82B0BBB98", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r005c10:*:*:*:*:*:*:*", matchCriteriaId: "71EF4F82-092F-4D19-832B-A174F7D47477", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v100r006c00:*:*:*:*:*:*:*", matchCriteriaId: "3C2DACA5-0AA6-419B-AC6A-8CC19326758E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4492E892-7BE5-413A-AD53-2D39BD6626F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8A2875-0F7E-4790-A925-5999396B7578", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "90200F0F-FF1A-42D9-A4EF-8DD5F6DB6BA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "061D3731-37D1-40A9-BE2B-7C43CADC3190", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "33B93684-6903-4A54-B631-15873D3D3744", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r005c10:*:*:*:*:*:*:*", matchCriteriaId: "9DFDAAAC-0585-406F-B547-FB71C5352209", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v100r006c00:*:*:*:*:*:*:*", matchCriteriaId: "916288E9-1DAB-40BE-9C29-3E8603FC0F02", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "1573B4A5-A78B-4A17-8E1B-673A11D18221", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "C8FD775C-F6B6-42B3-942E-EB4DC889B5F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "C42246DF-E736-4D98-AF73-3F5B731485D2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "EC3752F8-78AB-43C9-B499-B3E2031BB29B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E31AD6C5-E687-47C9-8473-2486A6864128", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r005c10:*:*:*:*:*:*:*", matchCriteriaId: "40D8A10D-8B77-4F43-87A9-803ED9855AC9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v100r006c00:*:*:*:*:*:*:*", matchCriteriaId: "5E574B02-F89A-4D5C-B462-3AF56F1C0A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "CD5BEF58-456D-4983-B1CA-A53CE5C4E24E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "19F2B3CC-12AD-466D-98F9-0C09C7C053CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "374AD269-B0F4-4534-ABAC-D08343B2CE42", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "DE5D868B-B2F8-4C25-8134-5ED8758AFB90", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "828A6E23-962D-4A92-B14D-949B01489F35", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r005c10:*:*:*:*:*:*:*", matchCriteriaId: "B676B444-6128-4A04-B3E7-421F74FA9CD1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v100r006c00:*:*:*:*:*:*:*", matchCriteriaId: "BF6985E0-9375-4DE2-A879-AAACF923381C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "B0FFE8C7-6E03-45ED-A581-779C75A5C432", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*", matchCriteriaId: "D05E858C-A3D8-4BF1-A750-CFD8C949ABF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "29D01E86-0F60-4A99-8E48-15B0B0BF3678", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "B25185C6-3F8D-4D86-84D9-4D81A3DF5632", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r005c32:*:*:*:*:*:*:*", matchCriteriaId: "E586B837-E86A-4B3E-8701-3C92123F9FED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c02:*:*:*:*:*:*:*", matchCriteriaId: "4C38768F-F3CC-404D-9C3E-7DB9A7C4C580", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_iad_firmware:v300r002c01:*:*:*:*:*:*:*", matchCriteriaId: "647B85DB-2E81-4EBA-A42C-7DBEF1EDD9D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_iad:-:*:*:*:*:*:*:*", matchCriteriaId: "91C8CF3B-2907-4E9C-8CA9-6FECDDC68812", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_usm_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "BECD4671-FA6A-434E-B3A8-5141AB850661", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_usm_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "7D516A52-BA26-4841-96AC-A0718698C92A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_usm:-:*:*:*:*:*:*:*", matchCriteriaId: "3B099CC1-0C25-46B3-B772-C61AC1657E97", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name.", }, { lang: "es", value: "Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01 y V300R001C00 tienen una vulnerabilidad de criptografía débil. Debido a que no se validan correctamente algunos valores en los certificados, un atacante remoto no autenticado podría falsificar un certificado RSA específico y explotar la vulnerabilidad para pasar la autenticación de identidad y los registros en el dispositivo objetivo para obtener los permisos configurados para el nombre de usuario específico.", }, ], id: "CVE-2017-17301", lastModified: "2024-11-21T03:17:47.340", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:03.610", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171222-01-cryptography-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, { lang: "es", value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Esta vulnerabilidad se debe a una protección de de verificación de paquetes insuficiente. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando paquetes manipulados. Una explotación con éxito podría provocar una fuga de memoria y una condición de denegación de servicio (DoS) en un dispositivo afectado.", }, ], id: "CVE-2017-15332", lastModified: "2024-11-21T03:14:28.893", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.377", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19417", lastModified: "2024-11-21T04:34:44.617", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.640", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ cisaActionDue: "2022-05-03", cisaExploitAdd: "2021-11-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Microsoft Remote Desktop Services Remote Code Execution Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", matchCriteriaId: "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB36445-3462-4398-84F9-1387A7436FC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_multix_m:-:*:*:*:*:*:*:*", matchCriteriaId: "66829DE2-25D6-4FF5-B1AA-6637AE053ACE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "733840A0-5D17-4D92-BB45-357E39CC9190", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_vertix_md_trauma:-:*:*:*:*:*:*:*", matchCriteriaId: "4FAFB504-D8F4-4589-9D25-616CB38BF257", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A9B1B857-3051-4312-A997-99570D567D74", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:axiom_vertix_solitaire_m:-:*:*:*:*:*:*:*", matchCriteriaId: "86974C5C-C4A4-4109-B5DC-85D4F01E94D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7392294B-487E-4B31-B6A5-560C4F547338", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:mobilett_xp_digital:-:*:*:*:*:*:*:*", matchCriteriaId: "DC524FD4-B53D-4E22-A9A9-33EB73811CF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCB111CF-1760-45FE-A005-68965EEB9034", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_acss_p:-:*:*:*:*:*:*:*", matchCriteriaId: "46335917-7477-47B9-9D03-079D0AFD6121", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72E96638-0DE1-4370-B0FC-8E418BD74C71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_p:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9E130C-EB9B-46F2-A67A-1CB22F67E3CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5FE644ED-DFE9-4F11-9C8B-E5EA6CF6BA1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro:-:*:*:*:*:*:*:*", matchCriteriaId: "1C221669-D976-4C2B-8634-2FB0583F27A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4AA78BA8-8443-441D-B629-5F5652296566", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_acss:-:*:*:*:*:*:*:*", matchCriteriaId: "F39B002A-3FCC-4F73-8BEA-575BD000C49F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2B6D8DF-5F9B-469E-B8F1-D59021B5D1A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_pro_navy:-:*:*:*:*:*:*:*", matchCriteriaId: "284692FE-2298-43F8-B59E-F86BA2453146", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAD4D073-FA45-4D28-BF69-0A706C61BA32", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_swing:-:*:*:*:*:*:*:*", matchCriteriaId: "69644600-D356-45A7-9E8B-91458255C252", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9AFC6443-6826-4C1F-95D7-621EA0C5B547", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top:-:*:*:*:*:*:*:*", matchCriteriaId: "29DFEA58-1949-41EF-AF8A-A01E2BD64ABE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98E0BDAE-DA78-439B-8368-E861BAB682EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_acss:-:*:*:*:*:*:*:*", matchCriteriaId: "68111C12-7DD9-4DB3-AC80-B95A5A063A09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B92FD292-31EB-448B-BD86-8D14A758A254", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_p:-:*:*:*:*:*:*:*", matchCriteriaId: "161AD776-6029-43EA-BDDA-FC8357699C33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FE3A3B2B-D371-49D4-B7C1-A00595282EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:multix_top_acss_p:-:*:*:*:*:*:*:*", matchCriteriaId: "610660AA-0AA6-434E-B824-80AE565570B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D1282797-1448-4B11-825F-49863AD4BDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:vertix_solitaire:-:*:*:*:*:*:*:*", matchCriteriaId: "3A4A8BC9-0249-45EB-91D7-1B57491F4951", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32E9780A-0015-4245-9CAE-D7573D8C4268", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:atellica_solution:-:*:*:*:*:*:*:*", matchCriteriaId: "7B264A65-9109-4629-8F20-1DD6728FAD7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "502E501A-78A0-4074-BC7D-7BAFE4386337", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:aptio:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8C9706-43E8-48E5-913C-FE0FDEEB489F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "195AD327-F323-4902-9CDB-4C7C1B3D1F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:streamlab:-:*:*:*:*:*:*:*", matchCriteriaId: "BD03E0CF-4707-4C95-8703-264429D52996", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0D56D3C8-5731-4EE2-B79B-BB74163E3D62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:centralink:-:*:*:*:*:*:*:*", matchCriteriaId: "500986D3-3A08-46C4-9482-88CFA6ED61B5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE2405D2-7048-4541-9526-AA2B88D2A38B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:viva_e:-:*:*:*:*:*:*:*", matchCriteriaId: "745742F2-A291-470B-8EB1-482A23873737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D64A2198-C839-43A8-BFEB-D575B372DD7F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:viva_twin:-:*:*:*:*:*:*:*", matchCriteriaId: "BA780EE3-B6AB-4393-9997-D09CBB433C51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B232D046-AD22-445F-8EE0-EED30BCA9DAD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFF1E341-5481-494A-BAFF-E080E39C9DA7", versionEndIncluding: "2.3.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*", matchCriteriaId: "9A4806F5-0292-45BA-96B9-422958D0CB0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B8CA8D2-1BA4-4B58-969D-DBA7F72DA755", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:lantis:-:*:*:*:*:*:*:*", matchCriteriaId: "06FF378C-EAAD-4808-9246-010AC0A17E90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A6B574A3-5FCD-4F3E-932D-10334180F4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "81635D07-BFBF-4485-B4CF-9C05620DB447", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:agile_controller-campus:-:*:*:*:*:*:*:*", matchCriteriaId: "592559FB-7551-4327-9ECE-9325F4173C85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DAAA4664-EB38-4693-88AD-F226D7A07C93", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh620_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "95D21222-A1F6-4312-B833-6576F75820C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "FC40CC46-D679-42F8-B2C2-FF3EDA28BCF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh621_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "11D61715-5074-41EC-A50F-5C347D85266F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "617A06EA-67C0-4714-B8D8-2602E0E34029", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh622_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "6E191F04-E8BE-4D73-89D0-42C2DB288C4D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "93792886-51EE-4172-ACED-F195F0556A98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bh640_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "EFBB2CA0-7556-42E8-B7C7-57F1C6477CFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "668E5527-0E2F-40CD-8857-B720A6C9B802", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch121:-:*:*:*:*:*:*:*", matchCriteriaId: "AA223DE5-F37C-4451-96A9-9DFA479591AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "8D7D565C-DC70-4978-BF91-79DD99FA347C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch140:-:*:*:*:*:*:*:*", matchCriteriaId: "8DB768F1-FA54-4043-B538-31783D941CC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E7D7D307-43F7-43AD-AA2E-F0DB66F7F9D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch220:-:*:*:*:*:*:*:*", matchCriteriaId: "ED03ED73-8B5C-4369-8F3A-68497718B488", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "685452C8-9B87-4FBC-9E27-0DF5F2B44807", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch221:-:*:*:*:*:*:*:*", matchCriteriaId: "211005F7-2DAA-40EC-9B92-D2E866052E84", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "E41FE7C8-77B4-4EC7-83C3-F587BDC8A18D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch222:-:*:*:*:*:*:*:*", matchCriteriaId: "21FB1E88-3CB4-48FE-9F52-AA12D40DB944", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "7BC1DD2F-DE32-4EA6-9539-792FCBDEF20D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch240:-:*:*:*:*:*:*:*", matchCriteriaId: "74027C23-3637-4ABE-A697-B20FD7B94162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "6185FD57-FE4F-43E2-A3EA-3AA5A299A05D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch242:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8DA951-047B-4A88-A851-9663F2EC2CEB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "563AC0A9-568C-4010-9142-28C88349B587", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*", matchCriteriaId: "D2637E43-1937-4320-AAF4-3770C332B66E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "774E8CD3-3E77-41EB-ABC9-CE885CC90FA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", matchCriteriaId: "1F66D29E-0B7F-45D3-BECC-21952F4A4850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3057065D-9D25-4BE2-8392-48405063E821", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e6000_chassis:-:*:*:*:*:*:*:*", matchCriteriaId: "748D3A0F-12FA-4755-969B-45D7B3D55147", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "14C6D34F-BFE4-420C-B496-E4D82783ED7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8F646FC2-3A77-4971-BACC-D0CA7B9379DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "C98EEDBC-42C6-4896-83A5-8EE175F4710C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:gtsoftx3000:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5827F-092C-4A94-A907-F653A55C280D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "22D7738B-B2B1-423C-A7C6-A73280F085C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", matchCriteriaId: "B7AAE27E-EB13-43E2-A7F4-7973977AD936", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "5B908D26-6C4F-4955-A284-39C4C338AEBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", matchCriteriaId: "B196FDFF-8A1D-4E7D-895A-1D09ADACC396", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "C46963C2-0175-4933-A2A1-4CFBA3FF4586", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", matchCriteriaId: "4E675B6C-C847-486F-8946-F98E271E1DC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "6188E188-7CA7-4415-835D-738A684B7639", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "981C1A1D-352D-478A-BF04-F1D9A71C86D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", matchCriteriaId: "675CCB4F-BB76-45DC-9E6E-3BD279995084", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "B9A7C688-25E6-457B-AFBF-657EDE621FFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "31EBFCDE-7FB8-4CA7-9A2E-F94DD572B48B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_hvs88t:-:*:*:*:*:*:*:*", matchCriteriaId: "5C3C47BF-7FAA-4A6C-BBDC-CC8D28CCA611", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9AA159F6-CE6C-4EC9-9166-718780F752CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh1288_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "F24DF092-9867-4381-BDFB-5AB7116DEFD4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "BE3450A4-4C1A-4125-8B18-3961D69D6F0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh1288a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "A7E91ACB-82D0-4A4E-9157-5142A26E577A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "485D4E2A-7697-40CD-92E4-0B93CB898DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2265_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "D3860458-155E-47F6-A37E-730DE7A363DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "1E293DFF-1C3F-4180-895D-E7BC4A14FB93", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2268_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "C6C2FB1E-2569-4AB9-95A2-DCD4AC8C7D1D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "97C57B46-9085-458A-8A5B-A6F74E00F4D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2285_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "38DF8C15-4086-4F70-BCD2-BDB91900C80A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "449982CF-3F17-473D-9B58-3E1076B1CF1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2285h_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "275A2FCA-8E0A-4EFA-907B-4F6E3E954372", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "377CAD92-7563-43D9-92A3-C05B149F65E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "9E1F1478-2D24-42D5-8401-3D6BAB20A7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A522BFBE-69E6-4DF8-83D3-27564AF88C6B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CB6AA6-2424-41B2-92A7-81E788DB8396", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "AE64C9F3-EEEF-44CB-8C3B-0969D2A76C81", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288e_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "7A446D94-F39F-461D-B935-02C87058D0AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "56D5E59C-5824-463B-8121-57E3689DD1C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2288h_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "908E0834-8E5D-43EF-A604-AAFCA6E69767", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "5AFBF820-E15D-4E7F-AD44-D4AE5EF208FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh2485_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "2D2E8A9D-7BC5-40D2-B85B-61D753A4D88B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "525FAA8B-734F-4B0D-8E32-9066CF9D939F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh5885_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "43C7EEF7-1AF2-41D8-98A6-0237524B76C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "779C3401-3A97-4DFE-AD0B-E8B2A48AA04A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rh5885_v3:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3BAFB9-A7C7-4199-89B2-587D650762C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*", matchCriteriaId: "2A756B3A-BD91-4857-869B-AF435E66BAD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:seco_vsm:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7EBA07-D6A7-4C45-8C57-84E2549A4CFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*", matchCriteriaId: "207D80F3-6DB4-4BDE-AE72-38BAF4EE2B67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "429F7534-D2A9-4275-9333-0786F315037E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:uma:-:*:*:*:*:*:*:*", matchCriteriaId: "E1940680-0927-4E56-83E3-3525797978B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "FF613F6D-DBC7-4A35-9A8D-B948FB3C84F9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:x6000:-:*:*:*:*:*:*:*", matchCriteriaId: "24BB4E74-B9A6-4C2C-AB61-A4028CDFF614", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*", matchCriteriaId: "48CBF1C9-1DA3-4B3C-AB00-42F41248B074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:x8000:-:*:*:*:*:*:*:*", matchCriteriaId: "02CCB6E7-0BF2-4762-BDD6-0F68B087CBF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "C3A696C2-836C-441C-875D-9D68F2DE25B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:elog:-:*:*:*:*:*:*:*", matchCriteriaId: "C34C1766-B15E-4C73-AE28-F22D9296DF20", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "95140BB8-911D-4F19-8C6E-DCD6FA2298AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_ecs:-:*:*:*:*:*:*:*", matchCriteriaId: "A924CA6B-C4BB-4340-BF27-B0EE4B72F9A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, { lang: "es", value: "Existe una vulnerabilidad de ejecución remota de código en Remote Desktop Services, anteriormente conocido como Terminal Services, cuando un atacante no autenticado se conecta al sistema de destino mediante RDP y envía peticiones especialmente diseñadas, conocida como 'Remote Desktop Services Remote Code Execution Vulnerability'.", }, ], id: "CVE-2019-0708", lastModified: "2025-04-07T18:22:06.710", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2019-05-16T19:29:00.427", references: [ { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { source: "secure@microsoft.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { source: "secure@microsoft.com", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-416", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, { lang: "es", value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado podría enviar paquetes manipulados a los productos afectados. Dada la verificación insuficiente de los paquetes, una explotación exitosa podría hacer que el proceso se reinicie.", }, ], id: "CVE-2017-15331", lastModified: "2024-11-21T03:14:28.733", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.330", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | smc2.0_firmware | v100r003c10 | |
huawei | smc2.0_firmware | v100r005c00spc100 | |
huawei | smc2.0_firmware | v100r005c00spc101b001t | |
huawei | smc2.0_firmware | v100r005c00spc102 | |
huawei | smc2.0_firmware | v100r005c00spc103 | |
huawei | smc2.0_firmware | v100r005c00spc200 | |
huawei | smc2.0_firmware | v100r005c00spc201t | |
huawei | smc2.0_firmware | v500r002c00 | |
huawei | smc2.0_firmware | v600r006c00 | |
huawei | smc2.0 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei SMC2.0 with software of V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00, V600R006C00 has an input validation vulnerability when handle TLS and DTLS handshake with certificate. Due to the insufficient validation of received PKI certificates, remote attackers could exploit this vulnerability to crash the TLS module.", }, { lang: "es", value: "Huawei SMC 2.0 con software V100R003C10, V100R005C00SPC100, V100R005C00SPC101B001T, V100R005C00SPC102, V100R005C00SPC103, V100R005C00SPC200, V100R005C00SPC201T, V500R002C00 y V600R006C00 tiene una vulnerabilidad de validación de entradas al gestionar una negociación TLS y DTLS con un certificado. Debido a la insuficiente validación de los certificados PKI recibidos, los atacantes remotos pueden explotar esta vulnerabilidad para cerrar inesperadamente el módulo TLS.", }, ], id: "CVE-2017-8213", lastModified: "2024-11-21T03:33:32.940", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-22T19:29:05.477", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170705-01-tls-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "C306035B-10B2-4BC5-B6DE-194BE343DA8E", versionEndIncluding: "3.9.0", versionStartIncluding: "3.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*", matchCriteriaId: "D3AB62FE-AB1A-4162-8A51-E34EDE33DD85", versionEndExcluding: "9.9.2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*", matchCriteriaId: "911FBD5E-213D-482F-81A9-C3B8CE7D903A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*", matchCriteriaId: "EBD2676F-EE9D-4462-ABA5-C11CE726849C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*", matchCriteriaId: "6505AE29-5091-4C72-AF6B-932DEF53A8D2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "4EC475C1-A339-4C49-B6BA-A0E4D6FDF5DF", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "38A45A86-3B7E-4245-B717-2A6E868BE6BE", vulnerable: true, }, { criteria: "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24EDBB8B-1AFB-498D-B78C-7BC72B8C1085", versionEndIncluding: "3.2.11", versionStartIncluding: "3.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3024389-3D4A-4E19-BE42-DAF9EA51D471", versionEndIncluding: "4.0.4", versionStartIncluding: "4.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", matchCriteriaId: "85EA16E0-9261-45C4-840F-5366E9EAC5E1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", matchCriteriaId: "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", matchCriteriaId: "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", matchCriteriaId: "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", matchCriteriaId: "A67A7B7A-998D-4B8C-8831-6E58406565FE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", matchCriteriaId: "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "807C024A-F8E8-4B48-A349-4C68CD252CA1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "F96E3779-F56A-45FF-BB3D-4980527D721E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", matchCriteriaId: "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", matchCriteriaId: "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", matchCriteriaId: "83737173-E12E-4641-BC49-0BD84A6B29D0", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", matchCriteriaId: "54D669D4-6D7E-449D-80C1-28FA44F06FFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", matchCriteriaId: "9BBCD86A-E6C7-4444-9D74-F861084090F0", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", matchCriteriaId: "16E6D998-B41D-4B49-9E00-8336D2E40A4A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "98381E61-F082-4302-B51F-5648884F998B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", matchCriteriaId: "7431ABC1-9252-419E-8CC1-311B41360078", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", matchCriteriaId: "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", matchCriteriaId: "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", matchCriteriaId: "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", matchCriteriaId: "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*", matchCriteriaId: "58D3B6FD-B474-4B09-B644-A8634A629280", vulnerable: true, }, { criteria: "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", matchCriteriaId: "F892F1B0-514C-42F7-90AE-12ACDFDC1033", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", matchCriteriaId: "A10BC294-9196-425F-9FB0-B1625465B47F", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", matchCriteriaId: "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", matchCriteriaId: "3ED68ADD-BBDA-4485-BC76-58F011D72311", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*", matchCriteriaId: "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", matchCriteriaId: "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", matchCriteriaId: "35BBD83D-BDC7-4678-BE94-639F59281139", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", matchCriteriaId: "67960FB9-13D1-4DEE-8158-31BF31BCBE6F", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", matchCriteriaId: "CB6476C7-03F2-4939-AB85-69AA524516D9", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", matchCriteriaId: "2470C6E8-2024-4CF5-9982-CFF50E88EAE9", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", matchCriteriaId: "15FC9014-BD85-4382-9D04-C0703E901D7A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", matchCriteriaId: "2F7F8866-DEAD-44D1-AB10-21EE611AA026", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", matchCriteriaId: "1831D45A-EE6E-4220-8F8C-248B69520948", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", matchCriteriaId: "2C9E2D37-9F56-49E0-BB28-56FB755CE078", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", matchCriteriaId: "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", matchCriteriaId: "F38D3B7E-8429-473F-BB31-FC3583EE5A5B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", matchCriteriaId: "D4840254-CC76-4113-BC61-360BD15582B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", matchCriteriaId: "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DBE3B60-DED8-4F47-A60F-410ECB873BAE", versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", matchCriteriaId: "AB54B753-F066-4387-B0C3-43E647A42EBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5BBD38A2-1B17-4B28-9FE1-6D62A6337C12", versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", matchCriteriaId: "1846C0CA-AE13-435F-BF91-EEE0CC311DD5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5884F45B-F822-46B9-A0DC-6B59A3C3E7E0", versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", matchCriteriaId: "C2EDCD99-9677-45A7-9221-3A6A41917A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9ED7A13F-9510-4FA0-96A6-D2D34D49545F", versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", matchCriteriaId: "9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C4C1EC1-19BE-4E1E-8F56-47A83AD0410D", versionEndExcluding: "xcp_1121", versionStartIncluding: "xcp", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*", matchCriteriaId: "0A2CEAD6-9F8C-411C-9107-BA858CB8A31B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e6000_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "075D228F-B3F3-44A0-9C93-510E2EF7BE16", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e6000:-:*:*:*:*:*:*:*", matchCriteriaId: "1F66D29E-0B7F-45D3-BECC-21952F4A4850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:e9000_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA0AE74D-A6FC-44A1-80D4-CB5039FD31AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:e9000:-:*:*:*:*:*:*:*", matchCriteriaId: "741F1B4C-D77D-416F-B6D9-0359F391D96F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "929D8B7A-4535-49EA-9DD6-AB83174337AA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18500:-:*:*:*:*:*:*:*", matchCriteriaId: "B7AAE27E-EB13-43E2-A7F4-7973977AD936", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E00020C-C1FB-425B-B285-BCF7450F76B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800:-:*:*:*:*:*:*:*", matchCriteriaId: "B196FDFF-8A1D-4E7D-895A-1D09ADACC396", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_18800f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "47CA0343-7F2A-45BE-B7A2-8F91F31C0912", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_18800f:-:*:*:*:*:*:*:*", matchCriteriaId: "4E675B6C-C847-486F-8946-F98E271E1DC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_9000_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "45D279CD-1344-4200-B4DF-303739323D19", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_9000:-:*:*:*:*:*:*:*", matchCriteriaId: "AEC54023-CF84-4095-A3E8-2D6E334768E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_cse_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4D5F81B5-BD6E-4B10-8EB9-AE0929E3DCE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_cse:-:*:*:*:*:*:*:*", matchCriteriaId: "7E9846D2-4A8C-421E-8FE0-F6091DD2B30E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C2453CC3-FDD3-4C42-9D17-C231DA2D1F41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_hvs85t:-:*:*:*:*:*:*:*", matchCriteriaId: "675CCB4F-BB76-45DC-9E6E-3BD279995084", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_s2600t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBD74E7B-DB83-44DF-9A0B-D2EFF346855A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_s2600t:-:*:*:*:*:*:*:*", matchCriteriaId: "5FFC0113-86D7-45B1-975F-B24AF1951C4A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_s5500t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E3E931B-BD89-48D1-BE5F-0BDBF78914C0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_s5500t:-:*:*:*:*:*:*:*", matchCriteriaId: "F36770F0-2E40-42FF-BD7B-7AE2C84E62A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_s5600t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63E1D8ED-A4EC-46B4-A0C0-8F46262F1D2F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_s5600t:-:*:*:*:*:*:*:*", matchCriteriaId: "6830C365-357D-41A3-8AA7-3B4854260762", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_s5800t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7A307235-4B7B-40EE-807A-9C8FFD8DF72C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_s5800t:-:*:*:*:*:*:*:*", matchCriteriaId: "866A8777-DB2A-4915-8DA6-1AF751742354", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_s6800t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "488319BB-6D39-4AA5-85A8-840EF46227F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_s6800t:-:*:*:*:*:*:*:*", matchCriteriaId: "C1F50E5B-8733-43AB-B6CF-66AC7305E2DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_vis6600t_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0BC3C090-EB04-4A0D-8644-51002CF2ABF5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_vis6600t:-:*:*:*:*:*:*:*", matchCriteriaId: "4D0988C3-BAE5-4B5A-92FC-9D275B4DE9F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4F01C05D-6937-4FAD-A0E1-6168EE1D7CE4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", matchCriteriaId: "2E756FE8-F106-4BFD-B33B-CC198363D2FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CF102265-497A-4766-80C8-323D511B4EAF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CF102265-497A-4766-80C8-323D511B4EAF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A3C463F-2C0B-4269-95ED-A578C01E0F55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", matchCriteriaId: "D2A9F6EB-8B6E-465C-B441-C4861771861E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:9700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A3C463F-2C0B-4269-95ED-A578C01E0F55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:9700:-:*:*:*:*:*:*:*", matchCriteriaId: "D2A9F6EB-8B6E-465C-B441-C4861771861E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89D69269-4251-4CE9-AD67-4968A917C1E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89D69269-4251-4CE9-AD67-4968A917C1E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "540F0482-7F5E-4688-B282-97A6576E0A6D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s3700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "789A2B2D-99B1-4AA5-BB39-65D58D8B59B0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s3700:-:*:*:*:*:*:*:*", matchCriteriaId: "B7F84390-E120-406B-967D-B473EB110EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700ei_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9FD39BD-0D24-4C1E-969C-C9509AE8A0D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700ei:-:*:*:*:*:*:*:*", matchCriteriaId: "1B0BE6C3-1FB2-4718-AA9D-1A8D8663C195", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700hi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "409A4E21-B8D8-445F-A9C4-3CDA73189CA9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700hi:-:*:*:*:*:*:*:*", matchCriteriaId: "ED775342-B93C-4DF9-BC62-B6BE549F1B29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700si_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB20E5-4830-411C-AE4B-6B2E180C0972", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700si:-:*:*:*:*:*:*:*", matchCriteriaId: "24C4DC87-DE8C-461F-A555-F6E9A71C1C48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5710ei_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "95E7ABCB-D0C0-4C18-A7AC-8C1EBD5E4E87", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5710ei:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D59F3D-CC4A-4ADD-B83C-5CE3F0546622", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5710hi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "065508F6-D026-4C99-B6F9-AE25CB1124D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5710hi:-:*:*:*:*:*:*:*", matchCriteriaId: "4DFF0F26-CDF2-49B0-AED7-EEA4B9E99E8C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "86E35CBD-4488-4E64-BEA2-A2E89A4BB9E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A0C6E3C4-5677-49B6-9D35-FAC2E550F311", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", matchCriteriaId: "B7859972-B7B8-4619-AAED-22B6B14852BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1755FB01-C830-4147-B0BF-7D422A7D2181", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", matchCriteriaId: "21B89917-2B3D-4BA5-8836-ADEECF46E976", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DF808C1-3081-4FC7-8661-FBF6A04761B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", matchCriteriaId: "86FFC3BE-77A0-4202-9AE0-06D8D67F6539", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A960DA7-8B35-43B3-B15F-F3F7E14BF308", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", matchCriteriaId: "CB64BC36-693E-4101-9C13-4A4C572A4EDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2750_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A0C6E3C4-5677-49B6-9D35-FAC2E550F311", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2750:-:*:*:*:*:*:*:*", matchCriteriaId: "B7859972-B7B8-4619-AAED-22B6B14852BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700li_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1755FB01-C830-4147-B0BF-7D422A7D2181", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700li:-:*:*:*:*:*:*:*", matchCriteriaId: "21B89917-2B3D-4BA5-8836-ADEECF46E976", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700s-li_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DF808C1-3081-4FC7-8661-FBF6A04761B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700s-li:-:*:*:*:*:*:*:*", matchCriteriaId: "86FFC3BE-77A0-4202-9AE0-06D8D67F6539", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5720hi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A960DA7-8B35-43B3-B15F-F3F7E14BF308", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5720hi:-:*:*:*:*:*:*:*", matchCriteriaId: "CB64BC36-693E-4101-9C13-4A4C572A4EDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5720ei_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6A799E13-49E1-4CFB-BB7D-5E528C7E0FE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5720ei:-:*:*:*:*:*:*:*", matchCriteriaId: "D7B06975-BD37-452D-9782-B768610D3777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D65BF93A-9246-48CB-8510-F6B0380F48D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:oceanstor_replicationdirector:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0A0D7527-BCA2-4CF5-A793-1C01F6570679", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:policy_center:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "95CA0A4C-2571-4593-A075-9A6A7EABBB33", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:policy_center:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "16D46E9E-7F34-49C4-B56F-9090157FAD6E", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v100r002c01:*:*:*:*:*:*:*", matchCriteriaId: "8D6E37DD-6CEA-443A-80C2-79E28C78D7CF", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v100r002c02:*:*:*:*:*:*:*", matchCriteriaId: "BE1A9027-21FC-45E0-98B2-BFB8B5BE484D", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v100r002c03:*:*:*:*:*:*:*", matchCriteriaId: "EC8620BB-7730-4C8F-8B4B-21389636B3C8", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v100r002c04:*:*:*:*:*:*:*", matchCriteriaId: "D971D78C-A6F3-438D-A292-54A9A226FFE9", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:ultravr:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "648D923E-BF31-4DF4-B160-66874A8E45AF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ibm:cognos_metrics_manager:10.1:*:*:*:*:*:*:*", matchCriteriaId: "23F3243D-14BB-45F4-BBF6-DD45B8729B6B", vulnerable: true, }, { criteria: "cpe:2.3:a:ibm:cognos_metrics_manager:10.1.1:*:*:*:*:*:*:*", matchCriteriaId: "97449883-5401-42C0-8FF1-6A5BEC7BC829", vulnerable: true, }, { criteria: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2:*:*:*:*:*:*:*", matchCriteriaId: "2B2DDB90-C6A1-4EE5-96F2-F0A33B2F79A9", vulnerable: true, }, { criteria: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.1:*:*:*:*:*:*:*", matchCriteriaId: "E43C2590-059B-43BE-BFD1-7B0D1020D324", vulnerable: true, }, { criteria: "cpe:2.3:a:ibm:cognos_metrics_manager:10.2.2:*:*:*:*:*:*:*", matchCriteriaId: "379CF92E-AFD1-4744-AC07-6A495548F121", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the \"Bar Mitzvah\" issue.", }, { lang: "es", value: "El algoritmo RC4, utilizado en el protocolo TLS y el protocolo SSL, no combina correctamente los datos de estados con los datos de claves durante la fase de inicialización, lo que facilita a atacantes remotos realizar ataques de recuperación de texto claro contra los bytes iniciales de un flujo mediante la captura de trafico de la red que ocasionalmente depende de claves afectadas por la debilidad de la invariabilidad (Invariance Weakness), y posteriormente utilizar un acercamiento de fuerza bruta que involucra valores LSB, también conocido como el problema de 'Bar Mitzvah'.", }, ], id: "CVE-2015-2808", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-04-01T02:00:35.097", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1006.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1007.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1020.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1021.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1091.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-454055", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/73684", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91787", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032599", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032600", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032707", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032708", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032734", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032788", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032858", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032868", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032910", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032990", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033071", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033072", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033386", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033415", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033431", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033432", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033737", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033769", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1036222", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://kb.juniper.net/JSA10783", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10163", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201512-10", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf", }, { source: "cve@mitre.org", url: "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143456209711959&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143629696317098&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143741441012338&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817021313142&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143817899717054&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=143818140118771&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144043644216842&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144059660127919&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144059703728085&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144060576831314&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144060606031437&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144069189622016&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144102017024820&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144104533800819&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144104565600964&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=144493176821532&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1006.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1007.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1021.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1091.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1228.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1229.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1230.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1241.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1242.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1243.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2015-1526.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2015/dsa-3316", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2015/dsa-3339", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-454055", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/73684", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91787", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032599", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032600", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032707", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032708", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032734", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032788", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032858", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032868", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1032990", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033071", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033072", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033386", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033415", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033431", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033432", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033737", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1033769", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1036222", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2696-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-2706-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://kb.juniper.net/JSA10783", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201512-10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | smc2.0_firmware | v600r006c00spc700 | |
huawei | smc2.0_firmware | v600r006c00spc800 | |
huawei | smc2.0_firmware | v600r006c10spc500 | |
huawei | smc2.0_firmware | v600r006c10spc600 | |
huawei | smc2.0_firmware | v600r006c10spc601 | |
huawei | smc2.0_firmware | v600r006c10spc602 | |
huawei | smc2.0_firmware | v600r006c10spc700 | |
huawei | smc2.0_firmware | v600r006c10spc800 | |
huawei | smc2.0_firmware | v600r006c10spca00 | |
huawei | smc2.0_firmware | v600r006c10spcb00 | |
huawei | smc2.0_firmware | v600r006c10spcc00 | |
huawei | smc2.0_firmware | v600r006c10spcd00 | |
huawei | smc2.0_firmware | v600r006c10spce00 | |
huawei | smc2.0_firmware | v600r019c00 | |
huawei | smc2.0_firmware | v600r019c10 | |
huawei | smc2.0 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "B91154A8-B34B-4779-9C40-4E0595D818E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "F5CDEF71-90EA-4A53-8BBC-1E7D36056A0E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "8957BBAB-E512-4578-B9E3-8B49847345A4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "08A935C9-89F2-449D-A669-50DF89BF973B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc601:*:*:*:*:*:*:*", matchCriteriaId: "C9DB7573-826B-486F-9701-031EB47C12A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc602:*:*:*:*:*:*:*", matchCriteriaId: "3550CDB5-94D4-4C3E-B771-531A76B5F42C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc700:*:*:*:*:*:*:*", matchCriteriaId: "926EF8A5-0C3B-4AAF-BFE5-E683218EA0DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "96EECF70-BE93-4DAE-A15A-6E99172A534E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spca00:*:*:*:*:*:*:*", matchCriteriaId: "893825D5-042C-41E1-A1BB-29362AE39C76", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcb00:*:*:*:*:*:*:*", matchCriteriaId: "649A0ECA-19FA-446F-9EF6-5F54064779CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcc00:*:*:*:*:*:*:*", matchCriteriaId: "82BBAD61-5012-44DE-BAAA-94A58B1105DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spcd00:*:*:*:*:*:*:*", matchCriteriaId: "980A8185-F674-4096-8B21-B47642FF4791", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c10spce00:*:*:*:*:*:*:*", matchCriteriaId: "678B2613-3F32-493B-99C5-DE400AE2B6B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c00:*:*:*:*:*:*:*", matchCriteriaId: "C2DC0656-EE97-43AF-9499-7ED8E31D6458", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r019c10:*:*:*:*:*:*:*", matchCriteriaId: "C32980F5-E091-4B2F-A8D3-F30367C8B9C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a privilege escalation vulnerability in SMC2.0 product. Some files in a directory of a module are located improperly. It does not apply the directory limitation. Attackers can exploit this vulnerability by crafting malicious file to launch privilege escalation. This can compromise normal service of affected products.", }, { lang: "es", value: "Se presenta una vulnerabilidad de escalada de privilegios en el producto SMC2.0. Algunos archivos en un directorio de un módulo están ubicados inapropiadamente. No aplica la limitación de directorio. Unos atacantes pueden explotar esta vulnerabilidad al diseñar archivos maliciosos para iniciar una escalada de privilegios. Esto puede comprometer el servicio normal de los productos afectados", }, ], id: "CVE-2020-9209", lastModified: "2024-11-21T05:40:10.383", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T23:15:13.807", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201230-01-pe-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.", }, { lang: "es", value: "AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegación de servicio (DoS). A causa de una lógica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podría enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotación exitosa de esta vulnerabilidad podría provocar un desbordamiento de pila y hacer que un servicio no esté disponible.", }, ], id: "CVE-2017-8162", lastModified: "2024-11-21T03:33:26.677", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-22T19:29:03.773", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | manageone | 6.5.1 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.0 | |
huawei | manageone | 8.0.1 | |
huawei | smc2.0 | v600r019c10spc700 | |
huawei | smc2.0 | v600r019c10spc702 | |
huawei | smc2.0 | v600r019c10spc703 | |
huawei | smc2.0 | v600r019c10spc800 | |
huawei | smc2.0 | v600r019c10spc900 | |
huawei | smc2.0 | v600r019c10spc910 | |
huawei | smc2.0 | v600r019c10spc920 | |
huawei | smc2.0 | v600r019c10spc921 | |
huawei | smc2.0 | v600r019c10spc922 | |
huawei | smc2.0 | v600r019c10spc930 | |
huawei | smc2.0 | v600r019c10spc931 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:manageone:6.5.1:spc200:*:*:*:*:*:*", matchCriteriaId: "481FA740-3E71-443D-99DF-89CA198951A2", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:-:*:*:*:*:*:*", matchCriteriaId: "EFA5EBB8-C174-4CF0-ADE6-15B62C10DD86", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:lcnd81:*:*:*:*:*:*", matchCriteriaId: "E9090F1E-EF60-4E54-9885-7F6B1681DE9A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "51E51969-9D4D-4A58-BEBD-19F4BD64BC7A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc3:*:*:*:*:*:*", matchCriteriaId: "2A1E9FF8-C0A4-47A5-9738-4D0ADB35DAF6", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:rc3.spc100:*:*:*:*:*:*", matchCriteriaId: "5D17BA55-6032-4BC4-BEB3-4FB27BA81777", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.0:spc100:*:*:*:*:*:*", matchCriteriaId: "7EDE7C94-7E89-45E6-8A79-32E53D9139DB", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:manageone:8.0.1:*:*:*:*:*:*:*", matchCriteriaId: "47A8E919-FAC0-4011-927F-599AA7688A32", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc700:*:*:*:*:*:*:*", matchCriteriaId: "7963F54D-82E2-49B4-A897-0D403265A5E0", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc702:*:*:*:*:*:*:*", matchCriteriaId: "11188CC9-6AF5-4D12-8698-A29003B93894", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc703:*:*:*:*:*:*:*", matchCriteriaId: "E39C9F23-B8A4-461B-AA1B-D74D4250B3C5", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "A80AA28A-E243-49B0-BC89-EC71C0FD391A", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc900:*:*:*:*:*:*:*", matchCriteriaId: "2DD9AFCB-49CC-451A-8384-4FC5209CBED0", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc910:*:*:*:*:*:*:*", matchCriteriaId: "8B96A81A-7CFC-4E47-8D23-8298E300C632", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc920:*:*:*:*:*:*:*", matchCriteriaId: "87F80ABC-A650-4FBC-B099-FA5022AEE80F", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc921:*:*:*:*:*:*:*", matchCriteriaId: "33211E67-DCE2-4763-A318-0901F6CE7D9D", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc922:*:*:*:*:*:*:*", matchCriteriaId: "DAEF1712-F605-43D2-9765-2F13D3FDE6E1", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc930:*:*:*:*:*:*:*", matchCriteriaId: "EEB259BD-CCCD-409D-885B-57FFFA33D3CD", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:smc2.0:v600r019c10spc931:*:*:*:*:*:*:*", matchCriteriaId: "5D8CFA5B-18D7-44A9-BE52-78B4AB8B1D45", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a multiple threads race condition vulnerability in Huawei product. A race condition exists for concurrent I/O read by multiple threads. An attacker with the root permission can exploit this vulnerability by performing some operations. Successful exploitation of this vulnerability may cause the system to crash. Affected product versions include: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2.0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931", }, { lang: "es", value: "Se presenta una vulnerabilidad de condición de carrera de múltiples hilos en el producto de Huawei. Se presenta una condición de carrera para la lectura concurrente de I/O por múltiples hilos. Un atacante con el permiso de root puede explotar esta vulnerabilidad al llevar a cabo algunas operaciones. Una explotación con éxito de esta vulnerabilidad puede causar el bloqueo del sistema. Las versiones del producto afectadas incluyen: ManageOne 6.5.1.SPC200, 8.0.0,8.0.0-LCND81, 8.0.0.SPC100, 8.0.1,8.0.RC2, 8.0.RC3, 8.0.RC3.SPC100;SMC2. 0 V600R019C10SPC700,V600R019C10SPC702, V600R019C10SPC703,V600R019C10SPC800, V600R019C10SPC900, V600R019C10SPC910, V600R019C10SPC920, V600R019C10SPC921, V600R019C10SPC922, V600R019C10SPC930, V600R019C10SPC931", }, ], id: "CVE-2021-22340", lastModified: "2024-11-21T05:49:56.537", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.7, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-29T19:15:09.180", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-racecondition-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }