Search criteria
4 vulnerabilities found for svn5300 by huawei
VAR-201306-0006
Vulnerability from variot - Updated: 2023-12-18 13:44The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world's leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei's mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. Successful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. The following are vulnerable: Huawei Quidway series Huawei CX600 V600R001 Huawei CX600 V600R003C00SPC900 Huawei ME60 V600R002C07 and prior versions AR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products ===========================================
[ADVISORY INFORMATION] Title: Weak password encryption on Huawei products Release date: 13/11/2012 Credits: Roberto Paleari, Emaze Networks (roberto.paleari@emaze.net) Ivan Speziale, Emaze Networks (ivan.speziale@emaze.net)
[VULNERABILITY INFORMATION] Class: Information disclosure
[AFFECTED PRODUCTS] We confirm the presence of this security vulnerability on the following products: * Huawei Quidway series * Huawei CX600
Other models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a victim's device can be deciphered instantaneously.
A Python procedure that decodes a given password is included below. Upon termination, procedure decrypt_password() returns the clear-text password.
from Crypto.Cipher import DES
def decode_char(c): if c == 'a': r = '?' else: r = c return ord(r) - ord('!')
def ascii_to_binary(s): assert len(s) == 24
out = [0]*18
i = 0
j = 0
for i in range(0, len(s), 4):
y = decode_char(s[i + 0])
y = (y << 6) & 0xffffff
k = decode_char(s[i + 1])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 2])
y = (y | k) & 0xffffff
y = (y << 6) & 0xffffff
k = decode_char(s[i + 3])
y = (y | k) & 0xffffff
out[j+2] = chr(y & 0xff)
out[j+1] = chr((y>>8) & 0xff)
out[j+0] = chr((y>>16) & 0xff)
j += 3
return "".join(out)
def decrypt_password(p): r = ascii_to_binary(p)
r = r[:16]
d = DES.new("\x01\x02\x03\x04\x05\x06\x07\x08", DES.MODE_ECB)
r = d.decrypt(r)
return r.rstrip("\x00")
[REMEDIATION] We recommend to store passwords using a proper hashing algorithm, instead of leveraging symmetric encryption. Further details are available at the following URL: http://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141
[COPYRIGHT] Copyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. Permission is hereby granted to redistribute this advisory, providing that no changes are made and that the copyright notices and disclaimers remain intact.
[DISCLAIMER] Emaze Networks S.p.A is not responsible for the misuse of the information provided in our security advisories. These advisories are a service to the professional security community. There are NO WARRANTIES with regard to this information. Any application or distribution of this information constitutes acceptance AS IS, at the user's own risk. This information is subject to change without notice
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0006",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003c01spc100"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "acu",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "ar g3",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002c00spc200"
},
{
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "atn",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c01"
},
{
"model": "cx200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "cx300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "cx600",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "e200e-b",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e-c",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x1",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e-x2",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "eudemon1000",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon1000e-u",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemon1000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "eudemon100e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r007"
},
{
"model": "eudemon200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemon300",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon500",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r006c02"
},
{
"model": "eudemon8000e-x",
"scope": "lte",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r003"
},
{
"model": "ma5200g",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "me60",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r005c00spc600"
},
{
"model": "ne20",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r005"
},
{
"model": "ne40",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r007"
},
{
"model": "ne5000e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v800r002"
},
{
"model": "ne80",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "nip100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip1000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "nip2100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "nip2200",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "nip5100",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c00"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s2300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s2700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s3300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s3700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5300hi",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5306",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s5700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s6700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s7700",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r003"
},
{
"model": "s9300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r006"
},
{
"model": "svn2000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "svn3000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r002c02spc802b041"
},
{
"model": "svn5000",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "svn5300",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v100r001c01b019"
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00"
},
{
"model": "wlan ac 6605",
"scope": "eq",
"trust": 1.8,
"vendor": "huawei",
"version": "v200r001c00spc100"
},
{
"model": "cx600",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon 8160e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemon usg5500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "e200x3",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "h3c ar\\",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2209"
},
{
"model": "ar 19\\/29\\/49",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "e200x7",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200 usg2200",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon usg9500",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "e200 usg5100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon usg5300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "eudemon 8080e",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "e200e-usg2100",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "ne40e\\/80e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "e200x5",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "ne20e-x6",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": "v300r005"
},
{
"model": "eudemon usg9300",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ar 19/29/49",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "r2207"
},
{
"model": "e200e-x3",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x5",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e-x7",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e/usg2100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005c01"
},
{
"model": "e200e/usg2200",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "e200e/usg5100",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r003c00"
},
{
"model": "eudemon8080e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemon8160e",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemonusg5300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001"
},
{
"model": "eudemonusg5500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r002"
},
{
"model": "eudemonusg9300",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r003c00"
},
{
"model": "eudemonusg9500",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "v200r001c00spc600"
},
{
"model": "h3c ar",
"scope": "lte",
"trust": 0.8,
"vendor": "huawei",
"version": "ar x9 series r2209"
},
{
"model": "ne20e-x6",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne40e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r001"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r002"
},
{
"model": "ne40e/80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v600r003"
},
{
"model": "ne80e",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v300r003"
},
{
"model": "s2700",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r005"
},
{
"model": "ne5000e v300r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne5000e v800r002",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ma5200g v200r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ma5200g v300r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne40e/80e",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "atn v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "atn v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne40/ne80 v300r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne20e-x6 v600r003",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ne20 v200r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "me60",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "cx200/cx300 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v100r003c01spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00spc100",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "acu v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "wlan ac v200r001c00",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "wlan ac v200r001c00spc100",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6605"
},
{
"model": "s9300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s7700",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300/s2700/s3 v100r005",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s2300/s3300/s5300/s3300hi/ v100r006",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "s3300hi/s5300hi/s5306/s630 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r001c01",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "ar g3 v200r002c00spc200",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "h3c ar ar series r2209",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c=x9"
},
{
"model": "ar r2207",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "19/29/49\u003c="
},
{
"model": "eudemon100e v200r007",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon200 v200r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "eudemon300\u0026500\u00261000 v200r006c02",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon1000e-u/usg5300 v200r001",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon1000e-x/usg5500 v200r002",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon8080e\u00268160e/usg9300 v100r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "eudemon8000e-x/usg9500 v200r001c00spc600",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "e200e-c\u0026x3\u0026x5\u0026x7/usg2200\u00265100 v200r003c00",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "e200e-b\u0026x1\u0026x2/usg2100 v100r005c01",
"scope": "lte",
"trust": 0.6,
"vendor": "huawei",
"version": "\u003c="
},
{
"model": "svn5300 v100r001c01b019",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "svn2000\u00265000 series v200r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "svn3000 v100r002c02spc802b041",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "nip100/200/1000 v100r001",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "nip2100\u00262200\u00265100 v100r001c00",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway series",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "quidway series",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "me60 v600r002c07",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r003c00spc900",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r001",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar r2207",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
},
{
"model": "me60 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r005c00spc900",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "cx600 v600r003c00spca00",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "ar r2209",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "19/29/49"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "r2209",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "r2207",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Roberto Paleari and Ivan Speziale from Emaze Networks",
"sources": [
{
"db": "BID",
"id": "56510"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
}
],
"trust": 0.9
},
"cve": "CVE-2012-4960",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT DEFINED",
"baseScore": 6.5,
"collateralDamagePotential": "LOW-MEDIUM",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT DEFINED",
"enviromentalScore": 5.1,
"exploitability": "FUNCTIONAL",
"exploitabilityScore": 8.0,
"id": "CVE-2012-4960",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT DEFINED",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"remediationLevel": "OFFICIAL FIX",
"reportConfidence": "CONFIRMED",
"severity": "MEDIUM",
"targetDistribution": "MEDIUM",
"trust": 0.8,
"userInterationRequired": null,
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2012-4960",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CNVD-2013-08074",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-58241",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2012-4960",
"trust": 2.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-58241",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack. Huawei networking equipment use a DES encryption algorithm for password and encryption. DES is publicly known to be easily cracked. plural Huawei The product uses the stored password DES Because of the use of the algorithm, a vulnerability exists in which a plaintext password is obtained.Brute force attack by attacker (Brute force attack) You may be able to get a plaintext password via. Huawei is the world\u0027s leading provider of information and communication solutions. Huawei Quidway is a series of switches developed by Huawei. The Huawei CX600 is based on Huawei\u0027s mature VRP platform and has powerful routing, L2/L3 multicast, 5-level H-QoS, packet buffering, and ACL capabilities. Multiple Huawei products are prone to a weak password encryption weakness. \nSuccessful exploits may allow an attacker to decrypt stored passwords; this may aid in further attacks. \nThe following are vulnerable:\nHuawei Quidway series\nHuawei CX600 V600R001\nHuawei CX600 V600R003C00SPC900\nHuawei ME60 V600R002C07 and prior versions\nAR 19/29/49 R2207 and prior versions. Weak password encryption on Huawei products\n===========================================\n\n[ADVISORY INFORMATION]\nTitle:\t\tWeak password encryption on Huawei products\nRelease date: 13/11/2012\nCredits: \tRoberto Paleari, Emaze Networks (roberto.paleari@emaze.net)\n\t\tIvan Speziale, Emaze Networks (ivan.speziale@emaze.net)\n\n[VULNERABILITY INFORMATION]\nClass: \t Information disclosure\n\n[AFFECTED PRODUCTS]\nWe confirm the presence of this security vulnerability on the following\nproducts:\n * Huawei Quidway series\n * Huawei CX600\n\nOther models are probably also vulnerable, but they were not checked. As a consequence, passwords extracted from a\nvictim\u0027s device can be deciphered instantaneously. \n\nA Python procedure that decodes a given password is included below. Upon\ntermination, procedure decrypt_password() returns the clear-text password. \n\n\u003ccut\u003e\nfrom Crypto.Cipher import DES\n\ndef decode_char(c):\n if c == \u0027a\u0027:\n r = \u0027?\u0027\n else:\n r = c\n return ord(r) - ord(\u0027!\u0027)\n\ndef ascii_to_binary(s):\n assert len(s) == 24\n\n out = [0]*18\n i = 0\n j = 0\n\n for i in range(0, len(s), 4):\n y = decode_char(s[i + 0])\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 1])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 2])\n y = (y | k) \u0026 0xffffff\n y = (y \u003c\u003c 6) \u0026 0xffffff\n\n k = decode_char(s[i + 3])\n y = (y | k) \u0026 0xffffff\n\n out[j+2] = chr(y \u0026 0xff)\n out[j+1] = chr((y\u003e\u003e8) \u0026 0xff)\n out[j+0] = chr((y\u003e\u003e16) \u0026 0xff)\n\n j += 3\n\n return \"\".join(out)\n\ndef decrypt_password(p):\n r = ascii_to_binary(p)\n\n r = r[:16]\n\n d = DES.new(\"\\x01\\x02\\x03\\x04\\x05\\x06\\x07\\x08\", DES.MODE_ECB)\n r = d.decrypt(r)\n\n return r.rstrip(\"\\x00\")\n\u003c/cut\u003e\n\n\n[REMEDIATION] \nWe recommend to store passwords using a proper hashing algorithm, instead of\nleveraging symmetric encryption. Further details are available at the following URL:\nhttp://support.huawei.com/enterprise/ReadLatestNewsAction.action?contentId=NEWS1000001141\n\n[COPYRIGHT]\nCopyright(c) Emaze Networks S.p.A 2012, All rights reserved worldwide. \nPermission is hereby granted to redistribute this advisory, providing that no\nchanges are made and that the copyright notices and disclaimers remain intact. \n\n[DISCLAIMER]\nEmaze Networks S.p.A is not responsible for the misuse of the information\nprovided in our security advisories. These advisories are a service to the\nprofessional security community. There are NO WARRANTIES with regard to this\ninformation. Any application or distribution of this information constitutes\nacceptance AS IS, at the user\u0027s own risk. This information is subject to change\nwithout notice",
"sources": [
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "PACKETSTORM",
"id": "118054"
}
],
"trust": 3.87
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-58241",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2012-4960",
"trust": 4.2
},
{
"db": "CERT/CC",
"id": "VU#948096",
"trust": 2.7
},
{
"db": "BID",
"id": "56510",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU90202792",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "118054",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-08074",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2012-6517",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "38020",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-58241",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"id": "VAR-201306-0006",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
}
],
"trust": 2.164663294642857
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
}
]
},
"last_update_date": "2023-12-18T13:44:36.277000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20120827-01-CX600",
"trust": 0.8,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"title": "Huawei multiple product encryption is not a strong vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/34800"
},
{
"title": "Huawei patch for multiple product password encryption vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/25088"
},
{
"title": "Huawei Fixing measures for vulnerabilities of encryption problems in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"trust": 1.9,
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4960"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90202792/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4960"
},
{
"trust": 0.6,
"url": "http://packetstormsecurity.org/files/118054/huawei-weak-password-encryption.html"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/56510"
},
{
"trust": 0.4,
"url": "http://support.huawei.com/enterprise/readlatestnewsaction.action?contentid=news1000001141"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/201211130911.qad9ba1q022014@sf01web1.securityfocus.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#948096"
},
{
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"db": "VULHUB",
"id": "VHN-58241"
},
{
"db": "BID",
"id": "56510"
},
{
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"db": "PACKETSTORM",
"id": "118054"
},
{
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-08-05T00:00:00",
"db": "CERT/CC",
"id": "VU#948096"
},
{
"date": "2013-06-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"date": "2013-06-20T00:00:00",
"db": "VULHUB",
"id": "VHN-58241"
},
{
"date": "2012-11-13T00:00:00",
"db": "BID",
"id": "56510"
},
{
"date": "2013-06-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"date": "2012-11-13T23:22:55",
"db": "PACKETSTORM",
"id": "118054"
},
{
"date": "2013-06-20T15:55:00.897000",
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"date": "2013-06-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-10-03T00:00:00",
"db": "CERT/CC",
"id": "VU#948096"
},
{
"date": "2013-07-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-08074"
},
{
"date": "2012-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2012-6517"
},
{
"date": "2013-08-22T00:00:00",
"db": "VULHUB",
"id": "VHN-58241"
},
{
"date": "2015-03-19T08:28:00",
"db": "BID",
"id": "56510"
},
{
"date": "2013-08-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2012-006004"
},
{
"date": "2013-08-22T03:59:17.713000",
"db": "NVD",
"id": "CVE-2012-4960"
},
{
"date": "2012-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"date": "2021-11-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei networking equipment weak password cipher",
"sources": [
{
"db": "CERT/CC",
"id": "VU#948096"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201211-280"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-403"
}
],
"trust": 1.2
}
}
FKIE_CVE-2012-4960
Vulnerability from fkie_nvd - Published: 2013-06-20 15:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:acu:v100r003c01spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "CE81EA02-600F-42CE-92C8-7E1D127E9B7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:acu:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "3A906E7E-7A10-474B-91C4-A30F7FAF55D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:acu:v200r001c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D1A17D-1CDD-4539-897E-A6067EAD1EE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_19\\/29\\/49:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82396118-3290-4683-902D-4955E81B84F9",
"versionEndIncluding": "r2207",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B19CE2AB-251D-478A-913C-65B5E0BBA0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r001c01:*:*:*:*:*:*:*",
"matchCriteriaId": "18BA268A-EF28-477C-AC24-38E322FFE553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ar_g3:v200r002c00spc200:*:*:*:*:*:*:*",
"matchCriteriaId": "554B2AC0-F4C6-4805-BB39-642D6D292A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:atn:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB1A47C-FB4F-4EF8-A614-95F3B2E6065D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:atn:v200r001c01:*:*:*:*:*:*:*",
"matchCriteriaId": "C26B81D9-0A62-4F6E-A9A4-5B22F08E0882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx200:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "A24ECC75-1032-4DFD-A0C3-315ABB68C50F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9BA9C4-65A8-4D9D-A21C-CEB53DB2E513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v200r002:*:*:*:*:*:*:*",
"matchCriteriaId": "D71F25CF-F4DE-4FC5-82E9-179CFFA4CA61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5D94D86A-C025-4A96-A700-D676B90CBBF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "3F61F187-74C5-4C50-9F91-6303C87582B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:cx600:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "BB2B2269-0784-4DE2-B48A-9A36F9B30F96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200_usg2200:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9151ED5E-04DD-4221-9669-C8112168A507",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200_usg5100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F63E41F8-8408-4E7A-A423-ACC2C44B3141",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8235FC6D-220F-4F75-BDD2-77FA661F33A2",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-c:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04FF6514-05AF-4D86-9B10-B50BC8D0622D",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-usg2100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D14FD9A2-90D5-493C-9BC7-095EBD644114",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25B60ADA-D40C-48C5-A237-DEE5DD372933",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200e-x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3502D88-6168-41E3-8641-4045C9EA9B90",
"versionEndIncluding": "v100r005c01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F6DBFF5-0B0B-4F0D-96A1-D2D487AE57C7",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF99475-D5A4-407E-8A7F-D6642186E5B6",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:e200x7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D68DD7D-29F9-460E-9D9C-A70F0DD489B1",
"versionEndIncluding": "v200r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_8080e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A801B9-7BB4-4E06-8ED2-D9EF565F313E",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_8160e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9D04EF-A73F-4BF6-AB34-3C489156BBD3",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg5300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3510EF8C-F3EB-4531-A0A8-8E0734652E26",
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A74A7-65FC-424C-ACAD-B6A6ED27FF60",
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg9300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "788B8EBF-16FA-4FDD-B07A-5A4F6E6B310A",
"versionEndIncluding": "v100r003c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon_usg9500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C625CA3-BD79-42E8-91B4-539E90FBF0C5",
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF18B94-150C-413F-B6D4-47B5E05DF4BA",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000e-u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB0AFBD-5F0E-494A-A752-9EE2F81DF2C5",
"versionEndIncluding": "v200r001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon1000e-x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11D8297A-362B-4056-A94F-9D49FF0B56B7",
"versionEndIncluding": "v200r002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon100e:v200r007:*:*:*:*:*:*:*",
"matchCriteriaId": "956ED431-6CE1-4873-BDC3-7832F5867C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon200:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5679FA9F-B4E5-42A9-9B9A-3601BE785CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "014E4B7B-E107-40B6-9B18-F5610959EA8B",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA4ACA-0104-4A93-9FBC-DC0496A1EB70",
"versionEndIncluding": "v200r006c02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:eudemon8000e-x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B686C4E-FD19-42B0-87A5-162D72C47BE0",
"versionEndIncluding": "v200r001c00spc600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:h3c_ar\\(oem_in\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDEE398-3BC9-4855-952F-44B37BF9F478",
"versionEndIncluding": "r2209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ma5200g:v200r003:*:*:*:*:*:*:*",
"matchCriteriaId": "8D17E429-865D-4677-872E-1E191BB0A6DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ma5200g:v300r003:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2ADD48-FBB4-4E65-8486-757D2ADA4DA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF75F78-2B91-47C3-B5AE-F4C9769B5AD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "18496123-2B0E-46D1-88F6-85897B2B65B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "E0045741-3B14-435E-8B12-B536751DD24F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8094F7-FAB2-4624-B2ED-467B40ADA260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:me60:v600r005c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC19826-AC6E-4DE1-95CA-49D4BB6F6644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne20:v200r005:*:*:*:*:*:*:*",
"matchCriteriaId": "49D7692F-6EA0-4A5E-B841-2B49332FCC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne20e-x6:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "C555EAC5-1E45-4BE5-8C69-DB1916A2EBF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2311E-D7DE-4C7C-BD88-4B947BD4F8E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "B23A5D99-8458-4285-ABF8-FA0D2F49B811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "5348DF82-072D-4B3B-9919-B5478420A98F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "54C3C26D-0FD0-48B9-A168-E9C6605DCB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne40e\\/80e:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4D3971-B2DA-44EC-97A1-CFF436BF44F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne5000e:v300r007:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA4A9B6-378D-4F4B-B88D-C13859E6236B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne5000e:v800r002:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6322F0-0749-4C3D-9144-D92A64B9D5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80:v300r005:*:*:*:*:*:*:*",
"matchCriteriaId": "74801C9A-31D1-4E74-9211-9AB67B5FEAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r001:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2D277B-08F0-4F6A-BC99-FBBCA4F5207D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r002:*:*:*:*:*:*:*",
"matchCriteriaId": "A81A4563-15DC-4125-9E3D-5B9FB0360EA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:ne80e:v600r003:*:*:*:*:*:*:*",
"matchCriteriaId": "449449A2-28B2-4A9A-A2C9-84A18596AEDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip100:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE4E8E1-AF7C-49E9-9758-887EFD8CB8F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip1000:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "90FF10E6-4080-4186-83DE-37703A468F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip200:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "6B0009DF-D44E-4D96-909F-B911D7BA127B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip2100:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CE9794-9A67-4F65-A81A-EE00AE714A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip2200:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DC0192-8E8B-4E0C-A91C-92094A167878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:nip5100:v100r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "9317FE4B-95F0-4615-9FA1-683D644BC3E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "871BB53D-F86F-4E3D-8DF7-875C8C1C7FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "7E655344-8341-4FFA-BBED-F5D5A15759D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "662EDAE9-2B0F-4774-8790-2C62997764FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "22621191-B2CD-4BA9-B6F1-8D59850604A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s2700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "142335E6-A4F5-4CC4-8D86-835C3E0E5211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7B5B70-1540-490F-8486-31639DB54F12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "33864641-EB9A-4CCC-9057-26D22AD839BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "59AD4C23-6315-4B97-85BB-1074F36F7291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "972BB8A0-27D8-4A0A-865E-57E37F70A484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300hi:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "41435CB4-537C-45DC-B8DB-0C1F38F1D222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3300hi:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5FE313-7374-4D7A-9A01-F389311710C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF096DC-B6F4-4763-AC6B-72CB46AB1976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "D1171FC3-5A2E-40C6-85FF-AF7E78F96C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s3700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "A706C2B0-5E15-4C90-910F-0ABB65573C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "2295584A-2664-45AE-BA0C-1B0411F29A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA542A3-7BB3-42B6-ACBB-D00AD4AD707A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "5361C4C5-BBC5-42FE-A575-985B57EF575E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "75A90C9F-8DAE-45B4-BB78-6080A434E5FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300hi:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "175A8714-CD80-472B-9507-829EBC59B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5300hi:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "81195EA9-D62B-492D-AA37-EF7AD17AED7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5306:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "47052A6F-E532-42B6-9B4B-46424A1F6377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5306:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "8B22E5AB-DAF6-4020-A62E-BE6FBE57D3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v100r005:*:*:*:*:*:*:*",
"matchCriteriaId": "3C178B6F-8608-4BBE-A8D8-8798FB1D75E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "29CAD535-0216-4048-BFDA-863AA5425BA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s5700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "9424F3B6-A280-4043-A670-3768D9515631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB869CD-37F8-4E77-8065-B9C8FADED40C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6300:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "C22B5DE3-03ED-4ED4-BD86-278197FA3FC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "652F2CCF-41FE-4DEC-8179-FF285AB99E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s6700:v200r001:*:*:*:*:*:*:*",
"matchCriteriaId": "66149AA8-E897-4563-97EC-C5EDCDBE072B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s7700:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3F7637-0B4C-40D0-B814-B19F10118795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s7700:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "04686A95-05CF-4ACC-89E5-2140DFC423F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r001:*:*:*:*:*:*:*",
"matchCriteriaId": "63BB797D-2C82-4A55-A26A-61A6C1C86888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r002:*:*:*:*:*:*:*",
"matchCriteriaId": "465F6E51-0676-4443-9122-CB2AD59C7516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r003:*:*:*:*:*:*:*",
"matchCriteriaId": "94970073-415B-4358-833F-CC220653376D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:s9300:v100r006:*:*:*:*:*:*:*",
"matchCriteriaId": "F26E31D2-31F8-4D4F-AD3A-44C59B22B121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn2000:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "59513736-11B7-47E6-B5C4-D33F9E032BEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn3000:v100r002c02spc802b041:*:*:*:*:*:*:*",
"matchCriteriaId": "931A86E3-43C1-4C72-8425-862C33A2DBA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn5000:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "15EBA968-C3E0-430E-944D-B4DA30B932C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:svn5300:v100r001c01b019:*:*:*:*:*:*:*",
"matchCriteriaId": "17A15567-DC96-4513-8681-93CE26B4FA07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00:*:*:*:*:*:*:*",
"matchCriteriaId": "1968B0D3-1653-459A-865D-79DBB9AADEE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:huawei:wlan_ac_6605:v200r001c00spc100:*:*:*:*:*:*:*",
"matchCriteriaId": "7490231F-7FAB-4875-812F-657B7BF4F136",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
},
{
"lang": "es",
"value": "Los Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, y NIP5100 utiliza el algoritmo DES para las contrase\u00f1as almacenados, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes dependientes de contexto obtener contrase\u00f1as de texto simple a trav\u00e9s de un ataque de fuerza bruta."
}
],
"id": "CVE-2012-4960",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-06-20T15:55:00.897",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from cvelistv5 – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-4960 (GCVE-0-2012-4960)
Vulnerability from nvd – Published: 2013-06-20 15:00 – Updated: 2024-08-06 20:50- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:50:18.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-12-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-22T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "VU#948096",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-4960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Huawei NE5000E, MA5200G, NE40E, NE80E, ATN, NE40, NE80, NE20E-X6, NE20, ME60, CX600, CX200, CX300, ACU, WLAN AC 6605, S9300, S7700, S2300, S3300, S5300, S3300HI, S5300HI, S5306, S6300, S2700, S3700, S5700, S6700, AR G3, H3C AR(OEM IN), AR 19, AR 29, AR 49, Eudemon100E, Eudemon200, Eudemon300, Eudemon500, Eudemon1000, Eudemon1000E-U/USG5300, Eudemon1000E-X/USG5500, Eudemon8080E/USG9300, Eudemon8160E/USG9300, Eudemon8000E-X/USG9500, E200E-C/USG2200, E200E-X3/USG2200, E200E-X5/USG2200, E200E-X7/USG2200, E200E-C/USG5100, E200E-X3/USG5100, E200E-X5/USG5100, E200E-X7/USG5100, E200E-B/USG2100, E200E-X1/USG2100, E200E-X2/USG2100, SVN5300, SVN2000, SVN5000, SVN3000, NIP100, NIP200, NIP1000, NIP2100, NIP2200, and NIP5100 use the DES algorithm for stored passwords, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#948096",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/948096"
},
{
"name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-u_194373.htm"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2012-4960",
"datePublished": "2013-06-20T15:00:00",
"dateReserved": "2012-09-17T00:00:00",
"dateUpdated": "2024-08-06T20:50:18.270Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}