All the vulnerabilites related to huawei - usg5500
cve-2016-8276
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/92962 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:20:29.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "name": "92962", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-03T20:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "name": "92962", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92962" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2016-8276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "name": "92962", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92962" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2016-8276", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2016-09-18T00:00:00", "dateUpdated": "2024-08-06T02:20:29.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-8798
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/93891 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | USG5500 V300R001C00 and V300R001C00 |
Version: USG5500 V300R001C00 and V300R001C00 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:35:01.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "name": "93891", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93891" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "USG5500 V300R001C00 and V300R001C00", "vendor": "n/a", "versions": [ { "status": "affected", "version": "USG5500 V300R001C00 and V300R001C00" } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server." } ], "problemTypes": [ { "descriptions": [ { "description": "defense mechanism bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-03T09:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "name": "93891", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93891" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2016-8798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "USG5500 V300R001C00 and V300R001C00", "version": { "version_data": [ { "version_value": "USG5500 V300R001C00 and V300R001C00" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "defense mechanism bypass" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "name": "93891", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93891" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2016-8798", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-08-06T02:35:01.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9137
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-372186 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900, |
Version: USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900, |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", "vendor": "n/a", "versions": [ { "status": "affected", "version": "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900," } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." } ], "problemTypes": [ { "descriptions": [ { "description": "CSRF", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-02T19:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2014-9137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", "version": { "version_data": [ { "version_value": "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900," } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-372186", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2014-9137", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2014-11-28T00:00:00", "dateUpdated": "2024-08-06T13:33:13.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8084
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/77300 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" }, { "name": "77300", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77300" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when \"DHCP Snooping\" is enabled and either \"option82 insert\" or \"option82 rebuild\" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-12-07T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" }, { "name": "77300", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77300" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when \"DHCP Snooping\" is enabled and either \"option82 insert\" or \"option82 rebuild\" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm", "refsource": "CONFIRM", "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" }, { "name": "77300", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77300" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8084", "datePublished": "2015-12-07T20:00:00", "dateReserved": "2015-11-06T00:00:00", "dateUpdated": "2024-08-06T08:06:31.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6669
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/92441 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:29.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "92441", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92441" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "92441", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92441" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "92441", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92441" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6669", "datePublished": "2016-09-22T15:00:00", "dateReserved": "2016-08-10T00:00:00", "dateUpdated": "2024-08-06T01:36:29.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9136
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-372186 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions, |
Version: FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions, |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", "vendor": "n/a", "versions": [ { "status": "affected", "version": "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions," } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." } ], "problemTypes": [ { "descriptions": [ { "description": "CSRF", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-02T19:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2014-9136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", "version": { "version_data": [ { "version_value": "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions," } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/hw-372186", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2014-9136", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2014-11-28T00:00:00", "dateUpdated": "2024-08-06T13:33:13.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:unified_security_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6E6BB-A840-42F2-A821-6BF13AA8AF5B", "versionEndIncluding": "v300r001c10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2100:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD8CA0C9-2506-41FE-BAB5-F2E96C60CA7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg2200:*:*:*:*:*:*:*:*", "matchCriteriaId": "15CAAE27-6D0D-4D76-92BF-A74ECE5A372D", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg5100:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9751860-5969-4D12-B73D-7B0F2A935E1F", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg5500:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D99C471-A099-4B82-BAE2-85C6B40FEDA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when \"DHCP Snooping\" is enabled and either \"option82 insert\" or \"option82 rebuild\" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets." }, { "lang": "es", "value": "Puertas de enlace de seguridad unificadas Huawei USG5500, USG2100, USG2200 y USG5100 con software en versiones anteriores a V300R001C10SPC600, cuando est\u00e1 habilitado \u0027DHCP Snooping\u0027 y ya sea que \u0027option82 insert\u0027 u \u0027option82 rebuild\u0027 est\u00e9n habilitado en una interfaz, permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de paquetes DHCP manipulados." } ], "id": "CVE-2015-8084", "lastModified": "2024-11-21T02:37:59.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-12-07T20:59:10.343", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/77300" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en | Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/93891 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93891 | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
huawei | usg5500_firmware | v300r001c00 | |
huawei | usg5500_firmware | v300r001c10 | |
huawei | usg5500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "5243A260-97C2-4DCA-BB0D-7F8013531C78", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:v300r001c10:*:*:*:*:*:*:*", "matchCriteriaId": "69BA0DF9-74A3-4BEE-95A4-EBAEDC0EA5E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC12456-351D-4DA4-8576-7FE9157E61DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server." }, { "lang": "es", "value": "Huawei USG5500 con software V300R001C00 y V300R001C00 permiten a atacantes eludir el m\u00f3dulo anti-DDoS del USGs para provocar una condici\u00f3n de denegaci\u00f3n de servicio en el servidor backend." } ], "id": "CVE-2016-8798", "lastModified": "2024-11-21T03:00:06.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:01.890", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93891" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | fusionmanager | * | |
huawei | fusionmanager | * | |
huawei | usg9500_firmware | * | |
huawei | usg9500_firmware | * | |
huawei | usg9500 | - | |
huawei | usg2100_firmware | * | |
huawei | usg2100 | - | |
huawei | usg2200_firmware | * | |
huawei | usg2200 | - | |
huawei | usg5100_firmware | * | |
huawei | usg5100 | - | |
huawei | usg5500_firmware | * | |
huawei | usg5500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F27EF98-F5DA-426D-9CDF-8E425A0B212A", "versionEndIncluding": "v100r002c03", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1468F171-852F-4CC1-BA64-340B35501A9B", "versionEndIncluding": "v100r003c00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EB84AA3-8F2D-40F4-998F-D8941C38EB15", "versionEndIncluding": "v200r001c01spc800", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F49A05F-6945-4C7D-BA45-3635840485BF", "versionEndIncluding": "v300r001c00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C486D62-23FD-4D64-AF97-2A70B1D6B715", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "56136202-9759-4A86-A52B-AE841319C4DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD11D623-1A81-4535-9BA1-1C5A118FE70C", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5140E0A4-AA43-4410-BE72-7A751B8025D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1799A24D-062B-4E70-BB59-41B8BC7D0A12", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC12456-351D-4DA4-8576-7FE9157E61DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." }, { "lang": "es", "value": "Huawei FusionManager con software V100R002C03 y V100R003C00 podr\u00edan permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web." } ], "id": "CVE-2014-9136", "lastModified": "2024-11-21T02:20:16.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:00.453", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | usg2100_firmware | * | |
huawei | usg2100_firmware | * | |
huawei | usg2200_firmware | * | |
huawei | usg2200_firmware | * | |
huawei | usg5100_firmware | * | |
huawei | usg5100_firmware | * | |
huawei | usg5500_firmware | * | |
huawei | usg5500_firmware | * | |
huawei | usg2100 | - | |
huawei | usg2200 | - | |
huawei | usg5100 | - | |
huawei | usg5500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F720A197-A45A-4BC4-87ED-26D1E3FD1F40", "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AECAEA1-22C8-4E17-91A2-81C3450BC00C", "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "325542AB-7154-4A5B-A85C-62AB251C4AC6", "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1480DC9-5518-43D9-A760-3779FF54C191", "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8132BF37-35B4-4385-A864-006EB5D2021F", "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "254AAB81-1C18-4C3D-A45C-2F0B035767D8", "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95F806D1-25F5-4D38-A9EA-C5E195C645A5", "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "605BC300-CCC1-4846-9848-3FA87256DD64", "versionEndIncluding": "v300r001c10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "56136202-9759-4A86-A52B-AE841319C4DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5140E0A4-AA43-4410-BE72-7A751B8025D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC12456-351D-4DA4-8576-7FE9157E61DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el m\u00f3dulo Authentication, Authorization y Accounting (AAA) en las puertas de entrada de seguridad unificadas USG2100, USG2200, USG5100 y USG5500 en Huawei con software en versiones anteriores a V300R001C10SPC600 permite a servidores RADIUS remotos autenticados ejecutar c\u00f3digo arbitrario enviando un paquete EAP manipulado." } ], "id": "CVE-2016-6669", "lastModified": "2024-11-21T02:56:35.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-22T15:59:05.977", "references": [ { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/92441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92441" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en | Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/92962 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92962 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:huawei:usg2100:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "DCE35454-78BD-4DCC-AD48-06A1DEA317FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg2100:v300r001c10:*:*:*:*:*:*:*", "matchCriteriaId": "BBA497E1-93B0-44C9-A9D3-00CF9462FA32", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg2200:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "AFCD0D03-10CD-4CE1-8095-CDEE34C9E484", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg2200:v300r001c10:*:*:*:*:*:*:*", "matchCriteriaId": "55FD4680-95F2-4310-AC8B-8DDB2B9ACE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg5100:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "C7F00E54-B3A2-4FDD-828A-F212F313A9AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg5100:v300r001c10:*:*:*:*:*:*:*", "matchCriteriaId": "10D7FDE1-2567-4F5D-B3BD-B11CF1CAB7ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg5500:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "71C29665-D669-4538-95BB-1080BB93F8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:usg5500:v300r001c10:*:*:*:*:*:*:*", "matchCriteriaId": "CC164C2F-2578-495F-B65C-BDC35695D698", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el m\u00f3dulo Point-to-Point Protocol over Ethernet (PPPoE) en gateways de seguridad unificadasHuawei USG2100, USG2200, USG5100 y USG5500 con software en versiones anteriores a V300R001C10SPC600, cuando la autenticaci\u00f3n CHAP est\u00e1 configurada en el servidor, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio del servidor) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes manipulados enviados durante la autenticaci\u00f3n." } ], "id": "CVE-2016-8276", "lastModified": "2024-11-21T02:59:03.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T21:59:09.457", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92962" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | fusionmanager | v100r002c03 | |
huawei | fusionmanager | v100r003c00 | |
huawei | usg9500_firmware | * | |
huawei | usg9500_firmware | v300r001c00 | |
huawei | usg9500 | - | |
huawei | usg2100_firmware | * | |
huawei | usg2100 | - | |
huawei | usg2200_firmware | * | |
huawei | usg2200 | - | |
huawei | usg5100_firmware | * | |
huawei | usg5100 | - | |
huawei | usg5500_firmware | * | |
huawei | usg5500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:huawei:fusionmanager:v100r002c03:*:*:*:*:*:*:*", "matchCriteriaId": "433EA4EE-77D4-40B7-8DD2-BC8500A498E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:huawei:fusionmanager:v100r003c00:*:*:*:*:*:*:*", "matchCriteriaId": "53A333D1-1346-4CF3-A17A-25A8A5A92713", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EB84AA3-8F2D-40F4-998F-D8941C38EB15", "versionEndIncluding": "v200r001c01spc800", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c00:*:*:*:*:*:*:*", "matchCriteriaId": "52132C6A-9B3C-47A1-8889-7B55C3C2A639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B6064BB-5E62-4D70-B933-05B5426EEE9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C486D62-23FD-4D64-AF97-2A70B1D6B715", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "matchCriteriaId": "56136202-9759-4A86-A52B-AE841319C4DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD11D623-1A81-4535-9BA1-1C5A118FE70C", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "5140E0A4-AA43-4410-BE72-7A751B8025D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1799A24D-062B-4E70-BB59-41B8BC7D0A12", "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC12456-351D-4DA4-8576-7FE9157E61DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface." }, { "lang": "es", "value": "Huawei USG9500 con software V200R001C01SPC800 y versiones anteriores, V300R001C00; USG2100 con software V300R001C00SPC900 y versiones anteriores; USG2200 con software V300R001C00SPC900; USG5100 con software V300R001C00SPC900 podr\u00edan permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web." } ], "id": "CVE-2014-9137", "lastModified": "2024-11-21T02:20:16.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:00.470", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201610-0207
Vulnerability from variot
Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication. HuaweiUSG2100 is a unified security gateway product of Huawei Technologies, China. A number of HuaweiUSG products have a buffer overflow vulnerability that allows remote attackers to exploit this vulnerability to submit a special request to crash an application. Multiple Huawei USG Products are prone to a buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the affected device. Failed exploit attempts will result in denial-of-service conditions. Point-to-Point Protocol over Ethernet (PPPoE) is a PPP protocol (point-to-point connection protocol) used in gateway products such as Huawei USG2100. The following products and versions are affected: Huawei USG2100 V300R001C00, V300R001C10; USG2200V300R001C00, V300R001C10; USG5100V300R001C00, V300R001C10;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201610-0207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "usg2200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5100", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2100", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2200", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5100", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2100", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5500", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2100 v300r001c00", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg2100 v300r001c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c00", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c00", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c00", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg2100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2100", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2200", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg5100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5100", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg5500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5500", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg5500 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2100 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "BID", "id": "92962" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:huawei:usg5500:v300r001c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg5500:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg5100:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg2200:v300r001c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg5100:v300r001c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg2100:v300r001c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg2100:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:usg2200:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-8276" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "92962" } ], "trust": 0.3 }, "cve": "CVE-2016-8276", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-8276", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2016-08078", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-97096", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-8276", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-8276", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2016-08078", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201609-395", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-97096", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "VULHUB", "id": "VHN-97096" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the Point-to-Point Protocol over Ethernet (PPPoE) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600, when CHAP authentication is configured on the server, allows remote attackers to cause a denial of service (server restart) or execute arbitrary code via crafted packets sent during authentication. HuaweiUSG2100 is a unified security gateway product of Huawei Technologies, China. A number of HuaweiUSG products have a buffer overflow vulnerability that allows remote attackers to exploit this vulnerability to submit a special request to crash an application. Multiple Huawei USG Products are prone to a buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the affected device. Failed exploit attempts will result in denial-of-service conditions. Point-to-Point Protocol over Ethernet (PPPoE) is a PPP protocol (point-to-point connection protocol) used in gateway products such as Huawei USG2100. The following products and versions are affected: Huawei USG2100 V300R001C00, V300R001C10; USG2200V300R001C00, V300R001C10; USG5100V300R001C00, V300R001C10;", "sources": [ { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "BID", "id": "92962" }, { "db": "VULHUB", "id": "VHN-97096" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-8276", "trust": 3.4 }, { "db": "BID", "id": "92962", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-005100", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201609-395", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-08078", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-97096", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "VULHUB", "id": "VHN-97096" }, { "db": "BID", "id": "92962" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "id": "VAR-201610-0207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "VULHUB", "id": "VHN-97096" } ], "trust": 1.375000025 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" } ] }, "last_update_date": "2023-12-18T13:29:27.492000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20160914-01-usg", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "title": "Patches for multiple HuaweiUSG product buffer overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/81681" }, { "title": "Multiple Huawei USG Product Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64189" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-97096" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160914-01-usg-en" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/92962" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8276" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8276" }, { "trust": 0.3, "url": "http://www.huawei.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "VULHUB", "id": "VHN-97096" }, { "db": "BID", "id": "92962" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-08078" }, { "db": "VULHUB", "id": "VHN-97096" }, { "db": "BID", "id": "92962" }, { "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "db": "NVD", "id": "CVE-2016-8276" }, { "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-26T00:00:00", "db": "CNVD", "id": "CNVD-2016-08078" }, { "date": "2016-10-03T00:00:00", "db": "VULHUB", "id": "VHN-97096" }, { "date": "2016-09-14T00:00:00", "db": "BID", "id": "92962" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "date": "2016-10-03T21:59:09.457000", "db": "NVD", "id": "CVE-2016-8276" }, { "date": "2016-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-26T00:00:00", "db": "CNVD", "id": "CNVD-2016-08078" }, { "date": "2016-10-04T00:00:00", "db": "VULHUB", "id": "VHN-97096" }, { "date": "2016-09-19T14:00:00", "db": "BID", "id": "92962" }, { "date": "2016-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005100" }, { "date": "2016-10-04T17:37:31.887000", "db": "NVD", "id": "CVE-2016-8276" }, { "date": "2016-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei USG Product software PPPoE Module buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005100" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-395" } ], "trust": 0.6 } }
var-201704-0449
Vulnerability from variot
Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. Huawei USG9500 is a firewall product of China Huawei. A cross-site request forgery vulnerability exists in several Huawei firewall USG series products. A remote attacker could exploit this vulnerability to perform unauthorized operations. Huawei USG9500 etc. The following products and versions are affected: Huawei USG9500 V200R001C01SPC800 and previous versions, V300R001C00 Version; USG2100 V300R001C00SPC900 and previous versions; USG2200 V300R001C00SPC900 and previous versions; USG5100 V300R001C00SPC900 and previous versions; USG5500 V300R001C00SPC900 and previous versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fusionmanager", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r002c03" }, { "model": "fusionmanager", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v100r003c00" }, { "model": "usg9500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2100", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5500", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg9500", "scope": "lte", "trust": 1.8, "vendor": "huawei", "version": "v200r001c01spc800" }, { "model": "usg2200", "scope": "eq", "trust": 1.4, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5100", "scope": "eq", "trust": 1.4, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "fusionmanager v100r002c03", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "fusionmanager v100r003c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c00spc900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg9500 \u003c=v200r001c01spc800", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg9500 \u003c=v300r001c00", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg2100 \u003c=v300r001c00spc900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg2200 \u003c=v300r001c00spc900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg5100 \u003c=300r001c00spc900", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "usg5500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg9500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c01spc800" }, { "model": "usg2100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:huawei:fusionmanager:v100r002c03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:fusionmanager:v100r003c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg9500_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c01spc800", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-9137" } ] }, "cve": "CVE-2014-9137", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-9137", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2017-04633", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-77082", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2014-9137", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2014-9137", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-04633", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201704-206", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-77082", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. Huawei USG9500 is a firewall product of China Huawei. A cross-site request forgery vulnerability exists in several Huawei firewall USG series products. A remote attacker could exploit this vulnerability to perform unauthorized operations. Huawei USG9500 etc. The following products and versions are affected: Huawei USG9500 V200R001C01SPC800 and previous versions, V300R001C00 Version; USG2100 V300R001C00SPC900 and previous versions; USG2200 V300R001C00SPC900 and previous versions; USG5100 V300R001C00SPC900 and previous versions; USG5500 V300R001C00SPC900 and previous versions", "sources": [ { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-9137", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2014-008286", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-206", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-04633", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-77082", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "id": "VAR-201704-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" } ], "trust": 1.5302197825 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" } ] }, "last_update_date": "2023-12-18T13:03:08.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20140924-02-CSRF", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "title": "A variety of Huawei firewall USG series products cross-site request forgery vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/91945" }, { "title": "A variety of Huawei firewalls USG Repair measures for cross-site request forgery vulnerability in series products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69053" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-77082" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9137" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9137" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-04633" }, { "db": "VULHUB", "id": "VHN-77082" }, { "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "db": "NVD", "id": "CVE-2014-9137" }, { "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2017-04633" }, { "date": "2017-04-02T00:00:00", "db": "VULHUB", "id": "VHN-77082" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "date": "2017-04-02T20:59:00.470000", "db": "NVD", "id": "CVE-2014-9137" }, { "date": "2017-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2017-04633" }, { "date": "2017-04-07T00:00:00", "db": "VULHUB", "id": "VHN-77082" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008286" }, { "date": "2017-04-07T12:10:45.547000", "db": "NVD", "id": "CVE-2014-9137" }, { "date": "2017-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-206" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-206" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei USG In product Web To the user of the interface CSRF Attacked vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008286" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-206" } ], "trust": 0.6 } }
var-201512-0241
Vulnerability from variot
Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when "DHCP Snooping" is enabled and either "option82 insert" or "option82 rebuild" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets. Multiple Huawei products are prone to a remote denial-of-service vulnerability. Successful exploits may allow an attackers to cause the affected device to restart, denying service to legitimate users. Huawei USG5500, USG2100, USG2200, and USG5100 are all unified security gateway products of Huawei in China. There are security vulnerabilities in many Huawei products. The following products and versions are affected: Huawei USG5500, USG2100, USG2200, and USG5100 using software versions earlier than V300R001C10SPC600
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unified security gateway", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c10" }, { "model": "unified security gateway", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg2100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "unified security gateway", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c10" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:unified_security_gateway_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg5100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg5500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg2200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-8084" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kurt Grutzmacher", "sources": [ { "db": "BID", "id": "77300" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ], "trust": 0.9 }, "cve": "CVE-2015-8084", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-8084", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-86045", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-8084", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-338", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-86045", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-86045" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when \"DHCP Snooping\" is enabled and either \"option82 insert\" or \"option82 rebuild\" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets. Multiple Huawei products are prone to a remote denial-of-service vulnerability. \nSuccessful exploits may allow an attackers to cause the affected device to restart, denying service to legitimate users. Huawei USG5500, USG2100, USG2200, and USG5100 are all unified security gateway products of Huawei in China. There are security vulnerabilities in many Huawei products. The following products and versions are affected: Huawei USG5500, USG2100, USG2200, and USG5100 using software versions earlier than V300R001C10SPC600", "sources": [ { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "BID", "id": "77300" }, { "db": "VULHUB", "id": "VHN-86045" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8084", "trust": 2.8 }, { "db": "BID", "id": "77300", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2015-006140", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-338", "trust": 0.7 }, { "db": "SEEBUG", "id": "SSVID-89905", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-86045", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86045" }, { "db": "BID", "id": "77300" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "id": "VAR-201512-0241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-86045" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:09:08.468000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20151021-01-USG", "trust": 0.8, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006140" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-86045" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/77300" }, { "trust": 1.7, "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-457916.htm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8084" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8084" } ], "sources": [ { "db": "VULHUB", "id": "VHN-86045" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-86045" }, { "db": "BID", "id": "77300" }, { "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "db": "NVD", "id": "CVE-2015-8084" }, { "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-07T00:00:00", "db": "VULHUB", "id": "VHN-86045" }, { "date": "2015-10-21T00:00:00", "db": "BID", "id": "77300" }, { "date": "2015-12-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "date": "2015-12-07T20:59:10.343000", "db": "NVD", "id": "CVE-2015-8084" }, { "date": "2015-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-12-08T00:00:00", "db": "VULHUB", "id": "VHN-86045" }, { "date": "2015-12-08T22:09:00", "db": "BID", "id": "77300" }, { "date": "2015-12-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006140" }, { "date": "2015-12-08T20:49:06.180000", "db": "NVD", "id": "CVE-2015-8084" }, { "date": "2015-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-338" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-338" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei USG Denial of service in product software (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006140" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-338" } ], "trust": 0.6 } }
var-201609-0170
Vulnerability from variot
Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet. Multiple Huawei USG Products are prone to a buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the affected device. Failed exploit attempts will result in denial-of-service conditions. Huawei USG2100 and others are the unified security gateway products of China Huawei (Huawei). Authentication, Authorization and Accounting (AAA) is one of the modules used to deal with computer resources and user requirements and provide authentication and authorization for enterprises. The AAA module in several Huawei products has a buffer overflow vulnerability. The following products and versions are affected: Huawei USG2100 V300R001C00, V300R001C10; USG2200 V300R001C00, V300R001C10; USG5100 V300R001C00, V300R001C10; USG5500 V300R001C00, V1C10R00
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0170", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "usg5500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2100", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2200", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg5100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5100", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg5500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5500", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "v300r001c10spc600" }, { "model": "usg2200", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg2200", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5500 v300r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2100 v300r001c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2100 v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg5100 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2200 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "usg2100 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "BID", "id": "92441" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-6669" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "92441" } ], "trust": 0.3 }, "cve": "CVE-2016-6669", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-6669", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-95489", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6669", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-6669", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201608-283", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-95489", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-95489" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the Authentication, Authorization and Accounting (AAA) module in Huawei USG2100, USG2200, USG5100, and USG5500 unified security gateways with software before V300R001C10SPC600 allows remote authenticated RADIUS servers to execute arbitrary code by sending a crafted EAP packet. Multiple Huawei USG Products are prone to a buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the affected device. Failed exploit attempts will result in denial-of-service conditions. Huawei USG2100 and others are the unified security gateway products of China Huawei (Huawei). Authentication, Authorization and Accounting (AAA) is one of the modules used to deal with computer resources and user requirements and provide authentication and authorization for enterprises. The AAA module in several Huawei products has a buffer overflow vulnerability. The following products and versions are affected: Huawei USG2100 V300R001C00, V300R001C10; USG2200 V300R001C00, V300R001C10; USG5100 V300R001C00, V300R001C10; USG5500 V300R001C00, V1C10R00", "sources": [ { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "BID", "id": "92441" }, { "db": "VULHUB", "id": "VHN-95489" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6669", "trust": 2.8 }, { "db": "BID", "id": "92441", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-004835", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-283", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95489", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95489" }, { "db": "BID", "id": "92441" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "id": "VAR-201609-0170", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-95489" } ], "trust": 0.7750000250000001 }, "last_update_date": "2023-12-18T12:44:50.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20160810-01-usg", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" }, { "title": "Multiple Huawei Product Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=63655" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95489" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/92441" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6669" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6669" }, { "trust": 0.3, "url": "http://www.huawei.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-95489" }, { "db": "BID", "id": "92441" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-95489" }, { "db": "BID", "id": "92441" }, { "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "db": "NVD", "id": "CVE-2016-6669" }, { "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-22T00:00:00", "db": "VULHUB", "id": "VHN-95489" }, { "date": "2016-08-10T00:00:00", "db": "BID", "id": "92441" }, { "date": "2016-09-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "date": "2016-09-22T15:59:05.977000", "db": "NVD", "id": "CVE-2016-6669" }, { "date": "2016-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-95489" }, { "date": "2016-08-10T00:00:00", "db": "BID", "id": "92441" }, { "date": "2016-09-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004835" }, { "date": "2016-11-28T20:33:55.317000", "db": "NVD", "id": "CVE-2016-6669" }, { "date": "2016-09-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-283" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-283" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei USG Product software AAA Module buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004835" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-283" } ], "trust": 0.6 } }
var-201704-0423
Vulnerability from variot
Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server. Huawei USG5500 The backend server disrupts service operation (DoS) There are vulnerabilities that are put into a state.By the attacker, USG of anti-DDoS By avoiding modules, back-end servers are disrupted in service operations (DoS) There is a possibility of being put into a state. HuaweiUS55500 is a firewall product of Huawei Technologies of China. A security vulnerability exists in the HuaweiUSG5500V300R001C00 and V300R001C10. The remote attacker can use the vulnerability to send a large number of HTTP packets to bypass the DDOS defense module of the USG product for denial of service attacks. Huawei USG Products are prone to a security-bypass vulnerability. An attacker may exploit this issue to bypass certain security restrictions and cause denial-of-service conditions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0423", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "usg5500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg5500", "scope": "eq", "trust": 2.4, "vendor": "huawei", "version": "v300r001c10" }, { "model": "usg5500 v300r001c00", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c10", "scope": null, "trust": 0.9, "vendor": "huawei", "version": null }, { "model": "usg5500 v300r001c10spc600", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "BID", "id": "93891" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:v300r001c10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-8798" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Third Research Institute of Ministry of Public Security.", "sources": [ { "db": "BID", "id": "93891" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ], "trust": 0.9 }, "cve": "CVE-2016-8798", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-8798", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10456", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-97618", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-8798", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-8798", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2016-10456", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-762", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-97618", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "VULHUB", "id": "VHN-97618" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei USG5500 with software V300R001C00 and V300R001C00 allows attackers to bypass the anti-DDoS module of the USGs to cause a denial of service condition on the backend server. Huawei USG5500 The backend server disrupts service operation (DoS) There are vulnerabilities that are put into a state.By the attacker, USG of anti-DDoS By avoiding modules, back-end servers are disrupted in service operations (DoS) There is a possibility of being put into a state. HuaweiUS55500 is a firewall product of Huawei Technologies of China. A security vulnerability exists in the HuaweiUSG5500V300R001C00 and V300R001C10. The remote attacker can use the vulnerability to send a large number of HTTP packets to bypass the DDOS defense module of the USG product for denial of service attacks. Huawei USG Products are prone to a security-bypass vulnerability. \nAn attacker may exploit this issue to bypass certain security restrictions and cause denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "BID", "id": "93891" }, { "db": "VULHUB", "id": "VHN-97618" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-8798", "trust": 3.4 }, { "db": "BID", "id": "93891", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-008212", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-762", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10456", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-97618", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "VULHUB", "id": "VHN-97618" }, { "db": "BID", "id": "93891" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "id": "VAR-201704-0423", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "VULHUB", "id": "VHN-97618" } ], "trust": 1.4 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" } ] }, "last_update_date": "2023-12-18T13:34:18.271000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20161026-01-usg", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "title": "HuaweiUSG product security bypass vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/83341" }, { "title": "Huawei USG5500 Repair measures for security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65116" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-284", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-97618" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/93891" }, { "trust": 2.0, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-usg-en" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8798" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8798" }, { "trust": 0.3, "url": "http://www.huawei.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "VULHUB", "id": "VHN-97618" }, { "db": "BID", "id": "93891" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10456" }, { "db": "VULHUB", "id": "VHN-97618" }, { "db": "BID", "id": "93891" }, { "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "db": "NVD", "id": "CVE-2016-8798" }, { "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-01T00:00:00", "db": "CNVD", "id": "CNVD-2016-10456" }, { "date": "2017-04-02T00:00:00", "db": "VULHUB", "id": "VHN-97618" }, { "date": "2016-10-26T00:00:00", "db": "BID", "id": "93891" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "date": "2017-04-02T20:59:01.890000", "db": "NVD", "id": "CVE-2016-8798" }, { "date": "2016-10-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-01T00:00:00", "db": "CNVD", "id": "CNVD-2016-10456" }, { "date": "2017-04-05T00:00:00", "db": "VULHUB", "id": "VHN-97618" }, { "date": "2016-11-24T00:03:00", "db": "BID", "id": "93891" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008212" }, { "date": "2017-04-05T16:17:45.237000", "db": "NVD", "id": "CVE-2016-8798" }, { "date": "2016-10-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-762" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-762" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei USG5500 Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008212" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-762" } ], "trust": 0.6 } }
var-201704-0448
Vulnerability from variot
Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. Huawei FusionManager is a management software for hardware devices, virtualized resources, and applications developed by Huawei in China. Cross-site request forgery vulnerabilities exist in Huawei FusionManager V100R002C03 and V100R003C00. A remote attacker could exploit this vulnerability to perform unauthorized operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0448", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fusionmanager", "scope": "eq", "trust": 1.4, "vendor": "huawei", "version": "v100r002c03" }, { "model": "fusionmanager", "scope": "eq", "trust": 1.4, "vendor": "huawei", "version": "v100r003c00" }, { "model": "usg9500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v200r001c01spc800" }, { "model": "usg9500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00" }, { "model": "usg2200", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "fusionmanager", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r003c00" }, { "model": "usg5100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5500", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "fusionmanager", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v100r002c03" }, { "model": "usg2100", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg2100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2200", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5100", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg5500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg9500", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "usg2200", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg9500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v200r001c01spc800" }, { "model": "usg2100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg5100", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00spc900" }, { "model": "usg9500", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "v300r001c00" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r003c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v100r002c03", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v200r001c01spc800", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "v300r001c00spc900", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-9136" } ] }, "cve": "CVE-2014-9136", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-9136", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-77081", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2014-9136", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2014-9136", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201704-207", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-77081", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-9136", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-77081" }, { "db": "VULMON", "id": "CVE-2014-9136" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface. Huawei FusionManager is a management software for hardware devices, virtualized resources, and applications developed by Huawei in China. Cross-site request forgery vulnerabilities exist in Huawei FusionManager V100R002C03 and V100R003C00. A remote attacker could exploit this vulnerability to perform unauthorized operations", "sources": [ { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "VULHUB", "id": "VHN-77081" }, { "db": "VULMON", "id": "CVE-2014-9136" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-9136", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2014-008278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-207", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-77081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-9136", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-77081" }, { "db": "VULMON", "id": "CVE-2014-9136" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "id": "VAR-201704-0448", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-77081" } ], "trust": 0.42087913 }, "last_update_date": "2023-12-18T12:04:19.554000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei-SA-20140924-02-CSRF", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "title": "Huawei FusionManager Fixes for cross-site request forgery vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=73794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-77081" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.huawei.com/en/psirt/security-advisories/hw-372186" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9136" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9136" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-77081" }, { "db": "VULMON", "id": "CVE-2014-9136" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-77081" }, { "db": "VULMON", "id": "CVE-2014-9136" }, { "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "db": "NVD", "id": "CVE-2014-9136" }, { "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-02T00:00:00", "db": "VULHUB", "id": "VHN-77081" }, { "date": "2017-04-02T00:00:00", "db": "VULMON", "id": "CVE-2014-9136" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "date": "2017-04-02T20:59:00.453000", "db": "NVD", "id": "CVE-2014-9136" }, { "date": "2017-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-05T00:00:00", "db": "VULHUB", "id": "VHN-77081" }, { "date": "2017-04-05T00:00:00", "db": "VULMON", "id": "CVE-2014-9136" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008278" }, { "date": "2017-04-05T18:51:25.057000", "db": "NVD", "id": "CVE-2014-9136" }, { "date": "2017-08-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-207" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei FusionManager In software Web For interface users CSRF Attacked vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-207" } ], "trust": 0.6 } }