Vulnerabilites related to huawei - usg9500_firmware
Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.",
      },
      {
         lang: "es",
         value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un desbordamiento de búfer de la pila cuando se decodifica un certificado, un atacante puede explotar la vulnerabilidad mediante un certificado malicioso para llevar a cabo un ataque de denegación de servicio en los productos afectados.",
      },
   ],
   id: "CVE-2019-5275",
   lastModified: "2024-11-21T04:44:39.223",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-26T19:15:11.127",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.",
      },
      {
         lang: "es",
         value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de omisión del control de acceso. Los atacantes que pueden acceder a la red interna pueden explotar esta vulnerabilidad con una implementación cuidadosa. Una explotación con éxito puede causar que el control de acceso sea omitido y los atacantes puedan acceder directamente a Internet.",
      },
   ],
   id: "CVE-2020-1860",
   lastModified: "2024-11-21T05:11:29.970",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:11.437",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:40
Summary
There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de denegación de servicio en algunos productos Huawei. En escenarios específicos, debido al manejo inapropiado de los paquetes, un atacante puede diseñar muchos paquetes específicos. Una explotación con éxito puede causar que algunos servicios sean anormales. Los productos afectados incluyen algunas versiones de NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 y SG9500",
      },
   ],
   id: "CVE-2020-9213",
   lastModified: "2024-11-21T05:40:10.703",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T18:15:14.370",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:20
Summary
Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F27EF98-F5DA-426D-9CDF-8E425A0B212A",
                     versionEndIncluding: "v100r002c03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1468F171-852F-4CC1-BA64-340B35501A9B",
                     versionEndIncluding: "v100r003c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EB84AA3-8F2D-40F4-998F-D8941C38EB15",
                     versionEndIncluding: "v200r001c01spc800",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F49A05F-6945-4C7D-BA45-3635840485BF",
                     versionEndIncluding: "v300r001c00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C486D62-23FD-4D64-AF97-2A70B1D6B715",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56136202-9759-4A86-A52B-AE841319C4DF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD11D623-1A81-4535-9BA1-1C5A118FE70C",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5140E0A4-AA43-4410-BE72-7A751B8025D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1799A24D-062B-4E70-BB59-41B8BC7D0A12",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC12456-351D-4DA4-8576-7FE9157E61DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
      },
      {
         lang: "es",
         value: "Huawei FusionManager con software V100R002C03 y V100R003C00 podrían permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web.",
      },
   ],
   id: "CVE-2014-9136",
   lastModified: "2024-11-21T02:20:16.207",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.453",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-18 01:16
Modified
2024-11-21 05:40
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A59F0A0-4138-4BA3-887D-5A4AE7B2F816",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "45889CE6-9A6C-48FE-B1F4-52CB85BB4809",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DCE606C-33E8-44C1-AD66-EDFEC391CBA8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos. Un atacante no autenticado diseña paquetes malformados con parámetros específicos y envía los paquetes a los productos afectados. Debido a una comprobación insuficiente de los paquetes, que pueden ser explotada para causar el reinicio del proceso. Las versiones del producto afectado incluyen:  IPS Module versiones V500R005C00, V500R005C10; NGFW Module versiones V500R005C00, V500R005C10; Secospace USG6300 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10",
      },
   ],
   id: "CVE-2020-9101",
   lastModified: "2024-11-21T05:40:01.727",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-18T01:16:35.037",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-05-23 19:59
Modified
2025-04-12 10:46
Summary
Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
      },
      {
         lang: "es",
         value: "Desbordamiento de buffer en la funcionalidad Smart DNS en los firewalls Huawei NGFW Module y Secospace USG6300, USG6500, USG6600 y USG9500 con software anterior a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con \"parámetros ilegítimos\".",
      },
   ],
   id: "CVE-2016-4577",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.8,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:A/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.2,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-05-23T19:59:11.197",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/90532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/90532",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.",
      },
      {
         lang: "es",
         value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un gran error de desbordamiento de búfer de la pila, un atacante puede explotar la vulnerabilidad mediante un certificado malicioso, resultando en una denegación de servicio en los productos afectados.",
      },
   ],
   id: "CVE-2019-5273",
   lastModified: "2024-11-21T04:44:39.013",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-26T19:15:10.967",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-27 13:15
Modified
2024-11-21 05:50
Summary
There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos de Huawei. El código de un módulo presenta una lógica de juicio erróneo. Unos atacantes pueden explotar esta vulnerabilidad mediante al llevar a cabo múltiples actividades anormales para desencadenar la lógica incorrecta y causar una escritura fuera de límites. Esto puede comprometer el servicio normal de las versiones de producto module.Affected incluyen: versiones NGFW Módulo V500R005C00SPC100, V500R005C00SPC200, versiones Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; versiones Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; versiones USG9500 V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200",
      },
   ],
   id: "CVE-2021-22411",
   lastModified: "2024-11-21T05:50:04.477",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-27T13:15:08.043",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.",
      },
      {
         lang: "es",
         value: "Los productos NIP6800; Secospace USG6600; USG9500 versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando el operador inicia sesión en el dispositivo y lleva a cabo algunas operaciones. Una explotación con éxito podría causar el reinicio un determinado proceso.",
      },
   ],
   id: "CVE-2020-1874",
   lastModified: "2024-11-21T05:11:31.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.9,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:11.890",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados con parámetros específicos y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17253",
   lastModified: "2024-11-21T03:17:43.067",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.383",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
                     matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
                     matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
                     matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
                     matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
                     matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
                     matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
                     matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
                     matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
                     matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
                     matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
                     matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
                     matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
                     matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
      },
      {
         lang: "es",
         value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a la verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   id: "CVE-2019-19415",
   lastModified: "2024-11-21T04:34:43.987",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-08T17:15:09.513",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de Denegación de Servicio (DoS). Debido a un procesamiento inapropiado de paquetes IPSEC específicos, un atacante remoto puede enviar paquetes IPSEC construidos hacia los dispositivos afectados para explotar esta vulnerabilidad. Una explotación con éxito podría causar que la función IPSec del dispositivo afectado sea anormal.",
      },
   ],
   id: "CVE-2020-1816",
   lastModified: "2024-11-21T05:11:26.260",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-18T00:15:11.337",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15335",
   lastModified: "2024-11-21T03:14:29.333",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.517",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-05-23 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE75ACF-D29C-4846-932D-FB9C84E1D35F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
      },
      {
         lang: "es",
         value: "Desbordamiento de buffer en la funcionalidad Application Specific Packet Filtering (ASPF) en dispositivos Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 con software en versiones anteriores a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con \"illegitimate parameters\".",
      },
   ],
   id: "CVE-2016-4576",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-05-23T19:59:09.980",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/90530",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/90530",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad en la que ocurre un error de administración de memoria cuando el Módulo IPSec maneja un mensaje específico. Esto causa una lectura fuera de límite de 1 byte, comprometiendo el servicio normal.",
      },
   ],
   id: "CVE-2020-1830",
   lastModified: "2024-11-21T05:11:27.083",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-18T00:15:11.400",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-13 15:15
Modified
2024-11-21 05:40
Summary
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
      },
      {
         lang: "es",
         value: "Algunos productos de Huawei presentan una vulnerabilidad de inyección de comandos. Debido a una comprobación insuficiente de la entrada, un atacante con privilegios elevados puede inyectar algunos códigos maliciosos en algunos archivos de los productos afectados. Una explotación con éxito puede causar una inyección de comandos. Las versiones del producto afectadas incluyen: NIP6300 versiones V500R001C30,V500R001C60; NIP6600 versiones V500R001C30,V500R001C60; Secospace USG6300 versiones V500R001C30,V500R001C60; Secospace USG6500 versiones V500R001C30,V500R001C60; Secospace USG6600 versiones V500R001C30,V500R001C60; USG9500 versiones V500R001C30,V500R001C60",
      },
   ],
   id: "CVE-2020-9127",
   lastModified: "2024-11-21T05:40:06.217",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-13T15:15:13.220",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-77",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.",
      },
      {
         lang: "es",
         value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00 y USG9500 V500R001C00 tienen una vulnerabilidad de validación de entradas insuficiente. Un atacante remoto no autenticado podría enviar mensajes MPLS Echo Request específicos a los productos afectados. Dada la validación de entradas insuficiente de algunos parámetros en los mensajes, la explotación con éxito podría provocar que el dispositivo se reinicie.",
      },
   ],
   id: "CVE-2017-15348",
   lastModified: "2024-11-21T03:14:31.017",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.143",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei secospace_usg6600_firmware v500r001c30spc100
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc300
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc100
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc300
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "73CEF009-33BC-4F61-9C43-F01BE6DE87F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C986370-A4E1-4EA0-BA3E-122F4D16D3F1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 tienen una vulnerabilidad de fuga de memoria debido a que la memoria no se libera cuando un atacante local autenticado ejecuta comandos especiales muchas veces. Un atacante podría aprovecharse de esto para provocar una fuga de memoria, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17162",
   lastModified: "2024-11-21T03:17:36.897",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:02.110",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
                     matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
                     matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
                     matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
                     matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
                     matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
                     matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
                     matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
                     matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
                     matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
                     matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
                     matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
                     matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
                     matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
      },
      {
         lang: "es",
         value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   id: "CVE-2019-19417",
   lastModified: "2024-11-21T04:34:44.617",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-08T17:15:09.640",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15334",
   lastModified: "2024-11-21T03:14:29.190",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.470",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:49
Summary
There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc200
huawei usg9500 -
huawei usg9520_firmware v500r005c00
huawei usg9520 -
huawei usg9560_firmware v500r005c00
huawei usg9560 -
huawei usg9580_firmware v500r005c00
huawei usg9580 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CAE4B21-DB0F-46BA-AEEF-878CFE2CB120",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "752FD81F-0750-4200-B732-304306D31BF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F890E352-DB01-4BF0-A709-0F63AE3F91AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de algoritmo no seguro en unos productos Huawei. Un módulo usa una entrada poco aleatoria en un mecanismo seguro. Unos atacantes pueden explotar esta vulnerabilidad mediante fuerza bruta para obtener mensajes confidenciales. Esto puede conllevar a un filtrado de información. Las versiones de producto afectadas incluyen: USG9500 versiones V500R001C30SPC200, V500R001C60SPC500, V500R005C00SPC200; USG9520 versiones V500R005C00; USG9560 versiones V500R005C00; USG9580 versiones V500R005C00",
      },
   ],
   id: "CVE-2021-22309",
   lastModified: "2024-11-21T05:49:53.087",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T18:15:14.433",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-330",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-22 19:15
Modified
2024-11-21 05:49
Summary
There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD519058-E753-440C-A954-931D8E6BA1CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45E9ED50-031B-48F9-AD89-8596D8A6B551",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "745CD04C-C989-439A-9145-D1BF5CE0E3F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de filtrado de información en los productos de Huawei. Un módulo no trata suficientemente la entrada específica. Los atacantes con altos privilegios pueden explotar esta vulnerabilidad llevando a cabo algunas operaciones. Esto puede conllevar a un filtrado de información. Las versiones de producto afectadas incluyen: Módulo IPS versiones V500R005C00, V500R005C10, V500R005C20; Módulo NGFW versiones V500R005C00,V500R005C10, V500R005C20; SeMG9811 versiones V500R005C00; USG9500 versiones V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20",
      },
   ],
   id: "CVE-2021-22342",
   lastModified: "2024-11-21T05:49:56.753",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-22T19:15:07.880",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.",
      },
      {
         lang: "es",
         value: "El módulo Common Open Policy Service Protocol (COPS) en Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30 y V500R001C50 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando un mensaje especialmente manipulado a los productos afectados. La vulnerabilidad se debe a la validación insuficiente de entradas del mensaje, lo que podría resultar en un desbordamiento de búfer. Una explotación con éxito podría provocar el funcionamiento erróneo de algunos servicios.",
      },
   ],
   id: "CVE-2017-15350",
   lastModified: "2024-11-21T03:14:31.353",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.250",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.",
      },
      {
         lang: "es",
         value: "NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100,  presentan una vulnerabilidad de escritura fuera de límites. Un atacante no autenticado diseña paquetes malformados con un parámetro específico y los envía hacia los productos afectados. Debido a una insuficiente comprobación de los paquetes, la cual puede ser explotada para causar el reinicio del proceso.",
      },
   ],
   id: "CVE-2020-1876",
   lastModified: "2024-11-21T05:11:31.607",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:12.030",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17136",
   lastModified: "2024-11-21T03:17:33.370",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.487",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dado la verificación insuficiente de los paquetes, una explotación exitosa podría provocar una fuga de memoria y acabar con una denegación de servicio (DoS).",
      },
   ],
   id: "CVE-2017-17257",
   lastModified: "2024-11-21T03:17:43.737",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.617",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Summary
Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c50
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.",
      },
      {
         lang: "es",
         value: "Los productos de firewall de Huawei USG9500 V500R001C50 tienen una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto que controle el dispositivo emparejado podría explotar la vulnerabilidad enviando paquetes IKE mal formados al dispositivo objetivo. Una explotación exitosa de la vulnerabilidad podría hacer que el dispositivo se reinicie.",
      },
   ],
   id: "CVE-2017-8167",
   lastModified: "2024-11-21T03:33:27.410",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-11-22T19:29:03.867",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-23 16:15
Modified
2024-11-21 05:49
Summary
There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D4E285D-09FB-4123-B46A-E27818ADFFDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A659FF-6019-48F8-BF60-D9FC79682435",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de algoritmo seguro débil en los productos de Huawei. Es usado un algoritmo seguro débil en un módulo. Los atacantes pueden explotar esta vulnerabilidad al capturar y analizar los mensajes entre dispositivos para obtener información. Esto puede conllevar una fuga de información. Las versiones de producto afectadas incluyen: Módulo IPS V500R005C00SPC100, V500R005C00SPC200; Módulo NGFW V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200",
      },
   ],
   id: "CVE-2021-22356",
   lastModified: "2024-11-21T05:49:58.060",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-23T16:15:08.633",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-05 15:15
Modified
2024-11-21 05:11
Summary
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c60spc500
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.",
      },
      {
         lang: "es",
         value: "Los productos Huawei NIP6800; Secospace USG6600; USG9500, presentan una vulnerabilidad de pérdida de memoria. Un atacante muy privilegiado puede explotar esta vulnerabilidad llevando a cabo continuamente operaciones específicas. Una explotación con éxito de esta vulnerabilidad puede causar un servicio anormal",
      },
   ],
   id: "CVE-2020-1883",
   lastModified: "2024-11-21T05:11:32.500",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-05T15:15:10.910",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15338",
   lastModified: "2024-11-21T03:14:29.783",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.657",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado llama al descodificador PEM con un parámetro especial, lo que podría provocar una denegación de servicio (DoS).",
      },
   ],
   id: "CVE-2017-17135",
   lastModified: "2024-11-21T03:17:33.207",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.427",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17137",
   lastModified: "2024-11-21T03:17:33.527",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.533",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15339",
   lastModified: "2024-11-21T03:14:29.927",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.720",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:14
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r005c00
huawei ips_module_firmware v500r005c20
huawei ips_module -
huawei ngfw_module_firmware v500r005c00
huawei ngfw_module -
huawei nip6600_firmware v500r005c00
huawei nip6600_firmware v500r005c20
huawei nip6600 -
huawei s12700_firmware v200r010c00spc600
huawei s12700_firmware v200r011c10spc500
huawei s12700_firmware v200r011c10spc600
huawei s12700_firmware v200r013c00spc500
huawei s12700_firmware v200r019c00spc200
huawei s12700_firmware v200r019c00spc500
huawei s12700_firmware v200r019c10spc200
huawei s12700_firmware v200r020c00
huawei s12700_firmware v200r020c10
huawei s12700 -
huawei s1700_firmware v200r010c00spc600
huawei s1700_firmware v200r011c10spc500
huawei s1700_firmware v200r011c10spc600
huawei s1700 -
huawei s2700_firmware v200r010c00spc600
huawei s2700_firmware v200r011c10spc500
huawei s2700_firmware v200r011c10spc600
huawei s2700 -
huawei s5700_firmware v200r010c00spc600
huawei s5700_firmware v200r010c00spc700
huawei s5700_firmware v200r011c10spc500
huawei s5700_firmware v200r011c10spc600
huawei s5700_firmware v200r019c00spc500
huawei s5700 -
huawei s6700_firmware v200r010c00spc600
huawei s6700_firmware v200r011c10spc500
huawei s6700_firmware v200r011c10spc600
huawei s6700 -
huawei s7700_firmware v200r010c00spc600
huawei s7700_firmware v200r010c00spc700
huawei s7700_firmware v200r011c10spc500
huawei s7700_firmware v200r011c10spc600
huawei s7700 -
huawei s9700_firmware v200r010c00spc600
huawei s9700_firmware v200r011c10spc500
huawei s9700_firmware v200r011c10spc600
huawei s9700 -
huawei usg9500_firmware v500r005c00
huawei usg9500_firmware v500r005c20
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEB99CA-7B73-4633-9F9C-9AF54B0A43FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "975CEC1E-D82C-45AD-B920-80961221C0BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9824CC2-7B77-4FD7-9509-49FA0D94AF4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "0442199D-AF21-44E8-B604-7D64129FD25D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2836F054-A1CD-4B9C-9D4E-7DD198ED6004",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2ED767D-2826-4ECD-8C59-B688AC54B0CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A58127B-8ED8-49AD-83CE-AF95E221E092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A630BDAD-C254-4107-9593-1E9FB415C138",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D63D0-072D-4E44-B254-491974603C7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "913DDCCC-0A91-458D-8A74-E4B9E9A71EC7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCC64B5-1BB4-4A4B-983F-D1D986CA506E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "32CA1299-EA8A-4A24-96AA-DC3C5C3B9701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "20386C76-4480-47ED-99AD-7ADBE41C3364",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "4676DA03-36A6-40B1-BA74-75260083D10A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C4217C-0FBB-46BC-B108-F53A2AF259E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "744381A0-4E85-4F0C-881B-DF2F7E1DB186",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D60424B-15CE-415E-8E6C-34E5DC52E6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "46FDAD12-710C-4FE1-950F-B57810649C16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F402F7DA-6BDF-4C53-B33B-3D8FE1B14506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "238025D5-0E08-4708-BA6D-6E6560814525",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r019c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "35753856-3BE4-481C-8D49-077E51138633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAA552D9-B8ED-4DD9-B825-FDB42F7070E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "83AE1FCE-5E38-4436-96B9-57DE026BDE7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F2F0768-EE4C-408B-8FDD-87CBC4970688",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "8030D59B-D7AC-4155-B23C-0E77603F9DEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7D191A-1496-4A38-BD9B-4222A9CA31BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4342AD2-7764-4447-9341-78DF30E20416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "37C57D09-618F-44B0-86A8-5BAC25CA486F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD82D614-9515-4A9C-B96A-2614DDADEB7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B45A35D3-D5CE-40F1-ABC2-9A9E6FA8FE46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "234ED4C3-67B4-4B0E-8EA1-9A70CAAD2BCF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos de Huawei. La vulnerabilidad está causada por una función de un módulo que no verifica correctamente el parámetro input. Una explotación con éxito podría causar una escritura fuera de límites conllevando a una condición de denegación de servicio. Las versiones de producto afectadas incluyen: Módulo IPS V500R005C00,V500R005C20;Módulo NGFW V500R005C00;NIP6600 V500R005C00,V500R005C20; S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10; S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20",
      },
   ],
   id: "CVE-2021-37129",
   lastModified: "2024-11-21T06:14:42.100",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-10-27T01:15:07.763",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de pérdida de memoria. El software no rastrea y libera suficientemente la memoria asignada mientras analiza determinado mensaje, el atacante envía el mensaje continuamente que podría consumir la memoria restante. Una explotación con éxito podría causar un agotamiento de la memoria.",
      },
   ],
   id: "CVE-2020-1815",
   lastModified: "2024-11-21T05:11:26.107",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-18T00:15:11.257",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.",
      },
      {
         lang: "es",
         value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un bucle infinito, un atacante puede explotar la vulnerabilidad por medio de un certificado malicioso para llevar a cabo un ataque de denegación de servicio en los productos afectados.",
      },
   ],
   id: "CVE-2019-5274",
   lastModified: "2024-11-21T04:44:39.117",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-26T19:15:11.047",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500 -
huawei oceanstor_5310_firmware v500r007c60spc100
huawei oceanstor_5310 5.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:oceanstor_5310_firmware:v500r007c60spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "58CACDE1-B634-4617-9C06-CEF8C15560E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:oceanstor_5310:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9164E876-5E19-4A87-963F-8C8CC01285D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
      },
      {
         lang: "es",
         value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de error de administración de recursos. Un atacante necesita llevar a cabo operaciones específicas para desencadenar una función del dispositivo afectado. Debido a una administración de recursos inapropiada de la función, la vulnerabilidad puede ser explotada para causar un servicio anormal en los dispositivos afectados.",
      },
   ],
   id: "CVE-2020-1881",
   lastModified: "2024-11-21T05:11:32.250",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:12.170",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c30
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c30
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei s12700_firmware v200r007c00
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r009c00
huawei s12700_firmware v200r010c00
huawei s12700 -
huawei s1700_firmware v200r006c10
huawei s1700_firmware v200r009c00
huawei s1700_firmware v200r010c00
huawei s1700 -
huawei s2700_firmware v200r006c10
huawei s2700_firmware v200r007c00
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r009c00
huawei s2700_firmware v200r010c00
huawei s2700 -
huawei s5700_firmware v200r006c00
huawei s5700_firmware v200r007c00
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r009c00
huawei s5700_firmware v200r010c00
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r009c00
huawei s6700_firmware v200r010c00
huawei s6700 -
huawei s7700_firmware v200r007c00
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r009c00
huawei s7700_firmware v200r010c00
huawei s7700 -
huawei s9700_firmware v200r007c00
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r009c00
huawei s9700_firmware v200r010c00
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c30s
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c02
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*",
                     matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
      },
      {
         lang: "es",
         value: "El módulo PEM de DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 de Huawei tiene una vulnerabilidad de denegación de servicio (DoS) debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso entre en un deadloop mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2017-17138",
   lastModified: "2024-11-21T03:17:33.680",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-03-05T19:29:00.580",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:20
Summary
Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:huawei:fusionmanager:v100r002c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "433EA4EE-77D4-40B7-8DD2-BC8500A498E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:huawei:fusionmanager:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A333D1-1346-4CF3-A17A-25A8A5A92713",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EB84AA3-8F2D-40F4-998F-D8941C38EB15",
                     versionEndIncluding: "v200r001c01spc800",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "52132C6A-9B3C-47A1-8889-7B55C3C2A639",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C486D62-23FD-4D64-AF97-2A70B1D6B715",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56136202-9759-4A86-A52B-AE841319C4DF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD11D623-1A81-4535-9BA1-1C5A118FE70C",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5140E0A4-AA43-4410-BE72-7A751B8025D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1799A24D-062B-4E70-BB59-41B8BC7D0A12",
                     versionEndIncluding: "v300r001c00spc900",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDC12456-351D-4DA4-8576-7FE9157E61DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
      },
      {
         lang: "es",
         value: "Huawei USG9500 con software V200R001C01SPC800 y versiones anteriores, V300R001C00; USG2100 con software V300R001C00SPC900 y versiones anteriores; USG2200 con software V300R001C00SPC900; USG5100 con software V300R001C00SPC900 podrían permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web.",
      },
   ],
   id: "CVE-2014-9137",
   lastModified: "2024-11-21T02:20:16.327",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-02T20:59:00.470",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-08 14:15
Modified
2024-11-21 05:40
Severity ?
Summary
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module_firmware v500r001c60
huawei ips_module_firmware v500r001c80
huawei ips_module_firmware v500r005c00
huawei ips_module_firmware v500r005c10
huawei ips_module_firmware v500r005c20
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c30
huawei ngfw_module_firmware v500r001c50
huawei ngfw_module_firmware v500r001c60
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module_firmware v500r002c20
huawei ngfw_module_firmware v500r002c30
huawei ngfw_module_firmware v500r005c00
huawei ngfw_module_firmware v500r005c10
huawei ngfw_module_firmware v500r005c20
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300_firmware v500r001c60
huawei nip6300_firmware v500r001c80
huawei nip6300_firmware v500r005c00
huawei nip6300_firmware v500r005c10
huawei nip6300_firmware v500r005c20
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600_firmware v500r001c60
huawei nip6600_firmware v500r001c80
huawei nip6600_firmware v500r005c00
huawei nip6600_firmware v500r005c10
huawei nip6600_firmware v500r005c20
huawei nip6600 -
huawei nip6800_firmware v500r001c60
huawei nip6800_firmware v500r001c80
huawei nip6800_firmware v500r005c00
huawei nip6800_firmware v500r005c10
huawei nip6800_firmware v500r005c20
huawei nip6800 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300_firmware v500r001c60
huawei secospace_usg6300_firmware v500r001c80
huawei secospace_usg6300_firmware v500r005c00
huawei secospace_usg6300_firmware v500r005c10
huawei secospace_usg6300_firmware v500r005c20
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500_firmware v500r001c60
huawei secospace_usg6500_firmware v500r001c80
huawei secospace_usg6500_firmware v500r005c00
huawei secospace_usg6500_firmware v500r005c10
huawei secospace_usg6500_firmware v500r005c20
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600_firmware v500r001c80
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600_firmware v500r005c10
huawei secospace_usg6600_firmware v500r005c20
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500_firmware v500r001c60
huawei usg9500_firmware v500r001c80
huawei usg9500_firmware v500r005c00
huawei usg9500_firmware v500r005c10
huawei usg9500_firmware v500r005c20
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC0C5A24-3F4E-4F1F-BC3C-7DC6707712CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "242CFA04-AACD-47EC-88DF-C564D5FBBBB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "10423C71-8077-4381-AE42-C0934BF37DA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBCA01CE-C561-4065-9F00-CCF6BB8343F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "225678FC-8643-40CB-BB08-2E9B68B58217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "5524ABE8-D4C4-4BCC-BB57-D1E47480330D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7910DC-DBD9-4C31-BA1C-7F6A2BEDDD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD519058-E753-440C-A954-931D8E6BA1CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C89C59-247A-490C-BA4C-F6F063A88F66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDC28A80-E6FE-49AB-AD2D-BF856FB917CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF85B0A-2737-4CF8-9535-E38EA164395A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ABF1FF0-52D2-4C0C-8225-D0C17A749A4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEB99CA-7B73-4633-9F9C-9AF54B0A43FA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "825F695B-F709-466C-BC05-B1C505991EFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8777EF7-D23B-4068-AB89-B0C2418E22B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C592F82-9646-47E9-832C-4B3B33CB4B4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC5407A-FAFF-4B09-AB3A-65510DFD4510",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A59F0A0-4138-4BA3-887D-5A4AE7B2F816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "043FF83A-3035-43EB-961F-D8552E2271BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A44500-3128-4A34-B639-28824BF60CED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "45889CE6-9A6C-48FE-B1F4-52CB85BB4809",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACFBBC28-71B4-40FE-9213-ABAC31451464",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DCE606C-33E8-44C1-AD66-EDFEC391CBA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "19166676-7BD6-447E-82BF-F1D68A1C750F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "745CD04C-C989-439A-9145-D1BF5CE0E3F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.",
      },
      {
         lang: "es",
         value: "Los productos Huawei IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 con versiones de V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30, presenta una vulnerabilidad de autenticación inapropiada. Los atacantes necesitan llevar a cabo algunas operaciones para explotar la vulnerabilidad. Una explotación con éxito puede obtener determinados permisos sobre el dispositivo",
      },
   ],
   id: "CVE-2020-9099",
   lastModified: "2024-11-21T05:40:01.350",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-08T14:15:13.353",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de fuga de información. Debido a un procesamiento inapropiado de algunos datos, un atacante autenticado local puede explotar esta vulnerabilidad por medio de una serie de operaciones. Una explotación con éxito puede causar una fuga de información.",
      },
   ],
   id: "CVE-2020-1857",
   lastModified: "2024-11-21T05:11:29.713",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T20:15:11.633",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.",
      },
      {
         lang: "es",
         value: "Los productos NIP6800; Secospace USG6600; USG9500 versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando ocurre una condición anormal en determinada operación. Una explotación con éxito podría causar el reinicio de un determinado proceso. Los productos afectados incluyen: NIP6800 versiones V500R001C30, V500R001C60SPC500; Secospace USG6600 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500; USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500.",
      },
   ],
   id: "CVE-2020-1875",
   lastModified: "2024-11-21T05:11:31.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:11.967",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 19:15
Modified
2024-11-21 05:49
Summary
There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de filtrado de información en algunos productos Huawei. Debido al almacenamiento apropiado de información específica en el archivo de registro, el atacante puede obtener la información cuando un usuario inicia sesión en el dispositivo. Una explotación con éxito puede causar un filtrado de información. versiones de productos afectados incluyen: NIP6300 versiones V500R001C00, V500R001C20, V500R001C30; NIP6600 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6300 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6500 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6600 versiones V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80; USG9500 versiones V500R005C00, V500R005C10",
      },
   ],
   id: "CVE-2021-22310",
   lastModified: "2024-11-21T05:49:53.197",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T19:15:11.773",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-532",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17254",
   lastModified: "2024-11-21T03:17:43.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.463",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dado la verificación insuficiente de los paquetes, una explotación exitosa podría provocar una fuga de memoria y acabar con una denegación de servicio (DoS).",
      },
   ],
   id: "CVE-2017-17256",
   lastModified: "2024-11-21T03:17:43.567",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.570",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v200r003c20spc900
huawei espace_u1981_firmware v200r003c30spc200
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría enviar paquetes SIP especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los paquetes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-17297",
   lastModified: "2024-11-21T03:17:46.770",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:03.407",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de comprobación de entrada donde el módulo IPSec no comprueba un campo en un mensaje específico. Los atacantes pueden enviar mensajes específicos para causar una lectura fuera de límite, comprometiendo el servicio normal.",
      },
   ],
   id: "CVE-2020-1828",
   lastModified: "2024-11-21T05:11:26.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T20:15:11.523",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.",
      },
      {
         lang: "es",
         value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de falta de comprobación de integridad. El software de los productos afectados no comprueba la integridad, lo que puede permitir a un atacante con privilegios altos llevar a cabo modificaciones maliciosas sin detección.",
      },
   ],
   id: "CVE-2019-5272",
   lastModified: "2024-11-21T04:44:38.910",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-26T19:15:10.920",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-354",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 20:15
Modified
2024-11-21 05:49
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c60
huawei nip6300 -
huawei nip6600_firmware v500r001c30
huawei nip6600 -
huawei nip6800_firmware v500r001c60
huawei nip6800 -
huawei s12700_firmware v200r007c01
huawei s12700_firmware v200r007c01b102
huawei s12700_firmware v200r008c00
huawei s12700_firmware v200r010c00
huawei s12700_firmware v200r010c00spc300
huawei s12700_firmware v200r011c00
huawei s12700_firmware v200r011c00spc100
huawei s12700_firmware v200r011c10
huawei s12700 -
huawei s1700_firmware v200r009c00spc200
huawei s1700_firmware v200r009c00spc500
huawei s1700_firmware v200r010c00
huawei s1700_firmware v200r010c00spc300
huawei s1700_firmware v200r011c00
huawei s1700_firmware v200r011c00spc100
huawei s1700_firmware v200r011c10
huawei s1700 -
huawei s2700_firmware v200r008c00
huawei s2700_firmware v200r010c00
huawei s2700_firmware v200r010c00spc300
huawei s2700_firmware v200r011c00
huawei s2700_firmware v200r011c00spc100
huawei s2700_firmware v200r011c10
huawei s2700 -
huawei s5700_firmware v200r008c00
huawei s5700_firmware v200r010c00
huawei s5700_firmware v200r010c00spc300
huawei s5700_firmware v200r011c00
huawei s5700_firmware v200r011c00spc100
huawei s5700_firmware v200r011c10
huawei s5700_firmware v200r011c10spc100
huawei s5700 -
huawei s6700_firmware v200r008c00
huawei s6700_firmware v200r010c00
huawei s6700_firmware v200r010c00spc300
huawei s6700_firmware v200r011c00
huawei s6700_firmware v200r011c00spc100
huawei s6700_firmware v200r011c10
huawei s6700_firmware v200r011c10spc100
huawei s6700 -
huawei s7700_firmware v200r008c00
huawei s7700_firmware v200r010c00
huawei s7700_firmware v200r010c00spc300
huawei s7700_firmware v200r011c00
huawei s7700_firmware v200r011c00spc100
huawei s7700_firmware v200r011c10
huawei s7700 -
huawei s9700_firmware v200r007c01
huawei s9700_firmware v200r007c01b102
huawei s9700_firmware v200r008c00
huawei s9700_firmware v200r010c00
huawei s9700_firmware v200r010c00spc300
huawei s9700_firmware v200r011c00
huawei s9700_firmware v200r011c00spc100
huawei s9700_firmware v200r011c10
huawei s9700 -
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c60
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c60
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c60
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA273AD6-F7C0-49F3-A33F-E46B86168A98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E46ADD0-4DF7-4C87-88D6-46A2065DB5B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB158E3E-8A26-415F-86E9-E63524EAA055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E146F90-3E3F-4F23-81C0-0C4F36293711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A91097D-76DB-4E5D-B520-6BF22E73BEFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D085F205-5C80-4A34-89A9-54F9FB8F2F69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "69FA8636-5936-4776-9DF2-1BD294796F0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A843B78A-CDB1-45A0-BBAC-6F3D69AD84DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "A59EDC82-83AD-408E-AA8E-15E221C3B009",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A57254C-A4F0-47D2-8A1A-029E79BE863C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9461516A-F5BB-4A52-A315-8C2B559528A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "225A56F2-2EEB-4816-9A20-7A6E37C65FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED5093F9-8629-4DA5-AC3A-EE5FFD7A57AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E9C52D-0F60-41E5-8646-1F4D908CA82C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A2FFFE5-5B4E-4040-BE25-A90D77AB53FE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "17889C1C-0187-4814-940D-5BA6DDA39ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F25342-CE07-44CD-BD61-A998DFC8EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31F91CA-80E9-4C2A-AD61-A4FC08C8A83E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "52947109-38C8-41A2-BC59-B43EA2343F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E3273C-3C33-4880-A044-389F5CB6FECA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "749528C3-5F85-4B80-98AA-FFD5574779F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2341D4F8-67E0-4B10-9D16-F2282D3EDBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2091CE58-DB15-4D36-ABF9-5DC94D39E358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BBC7227-051E-4244-9A63-760D0714DA35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D42D4D0E-2E0D-448E-B83D-50A1361C048B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "90A601DF-D90C-43EB-8A56-3890CF0C252D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de uso de la memoria previamente liberada en un producto de Huawei. Un módulo no puede tratar operaciones específicas en escenarios especiales. Los atacantes pueden explotar esta vulnerabilidad al realizar operaciones maliciosas. Esto puede causar un uso de la memoria previamente liberada, comprometiendo el servicio normal. Los productos afectados incluyen algunas versiones de NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700, S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 y USG9500",
      },
   ],
   id: "CVE-2021-22321",
   lastModified: "2024-11-21T05:49:54.420",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T20:15:17.613",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r007c00spc600
huawei ar510_firmware v200r007c00spc900
huawei ar510_firmware v200r007c00spcb00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c00spc200t
huawei smc2.0_firmware v100r003c00spc300t
huawei smc2.0_firmware v100r003c00spc301t
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00spc100
huawei smc2.0_firmware v100r005c00spc101b001t
huawei smc2.0_firmware v100r005c00spc102
huawei smc2.0_firmware v100r005c00spc103
huawei smc2.0_firmware v100r005c00spc200
huawei smc2.0_firmware v100r005c00spc201t
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v600r006c00
huawei smc2.0 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01spc500
huawei semg9811_firmware v300r001c01spc500t
huawei semg9811_firmware v300r001c01spc700
huawei semg9811_firmware v300r001c01spca00
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei softco_firmware v200r001c01spc300
huawei softco_firmware v200r001c01spc400
huawei softco_firmware v200r001c01spc500
huawei softco_firmware v200r001c01spc600
huawei softco_firmware v200r001c01sph703
huawei softco_firmware v200r003c00spc100
huawei softco_firmware v200r003c00spc200
huawei softco_firmware v200r003c00spc500
huawei softco_firmware v200r003c20
huawei softco -
huawei te30_firmware v100r001c02spc100
huawei te30_firmware v100r001c02spc200
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00spc200
huawei te30_firmware v500r002c00spc600
huawei te30_firmware v500r002c00spc700
huawei te30_firmware v500r002c00spc900
huawei te30_firmware v500r002c00spcb00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00spc600
huawei te40_firmware v500r002c00spc700
huawei te40_firmware v500r002c00spc900
huawei te40_firmware v500r002c00spcb00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00spc600
huawei te50_firmware v500r002c00spcb00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01spc100
huawei te60_firmware v100r001c10
huawei te60_firmware v100r001c10spc300
huawei te60_firmware v100r001c10spc400
huawei te60_firmware v100r001c10spc500
huawei te60_firmware v100r001c10spc600
huawei te60_firmware v100r001c10spc800
huawei te60_firmware v100r003c00
huawei te60_firmware v500r002c00
huawei te60_firmware v500r002c00spc100
huawei te60_firmware v500r002c00spc200
huawei te60_firmware v500r002c00spc300
huawei te60_firmware v500r002c00spc600
huawei te60_firmware v500r002c00spc700
huawei te60_firmware v500r002c00spc800
huawei te60_firmware v500r002c00spc900
huawei te60_firmware v500r002c00spca00
huawei te60_firmware v500r002c00spcb00
huawei te60_firmware v600r006c00
huawei te60_firmware v600r006c00spc200
huawei te60 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v300r001c01
huawei usg9500_firmware v300r001c20
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01spc800pwe
huawei usg9520 -
huawei usg9560_firmware v300r001c20spc300
huawei usg9560 -
huawei vp9660_firmware v200r001c02spc100
huawei vp9660_firmware v200r001c02spc200
huawei vp9660_firmware v200r001c02spc300
huawei vp9660_firmware v200r001c02spc300t
huawei vp9660_firmware v200r001c02spc400
huawei vp9660_firmware v200r001c30spc100
huawei vp9660_firmware v200r001c30spc100b015t
huawei vp9660_firmware v200r001c30spc101
huawei vp9660_firmware v200r001c30spc101tb015
huawei vp9660_firmware v200r001c30spc102t
huawei vp9660_firmware v200r001c30spc103t
huawei vp9660_firmware v200r001c30spc104t
huawei vp9660_firmware v200r001c30spc200
huawei vp9660_firmware v200r001c30spc200b022t
huawei vp9660_firmware v200r001c30spc201b023t
huawei vp9660_firmware v200r001c30spc202b025t
huawei vp9660_firmware v200r001c30spc203t
huawei vp9660_firmware v200r001c30spc206t
huawei vp9660_firmware v200r001c30spc207t
huawei vp9660_firmware v200r001c30spc208t
huawei vp9660_firmware v200r001c30spc209t
huawei vp9660_firmware v200r001c30spc300
huawei vp9660_firmware v200r001c30spc400
huawei vp9660_firmware v200r001c30spc400b001
huawei vp9660_firmware v200r001c30spc400t
huawei vp9660_firmware v200r001c30spc401t
huawei vp9660_firmware v200r001c30spc402t
huawei vp9660_firmware v200r001c30spc403t
huawei vp9660_firmware v200r001c30spc404t
huawei vp9660_firmware v200r001c30spc405t
huawei vp9660_firmware v200r001c30spc600
huawei vp9660_firmware v200r001c30spc700
huawei vp9660_firmware v200r001c30spc700t
huawei vp9660_firmware v200r001c30spc701t
huawei vp9660_firmware v200r001c30spc702t
huawei vp9660_firmware v200r001c30spc703t
huawei vp9660_firmware v200r001c30spc800
huawei vp9660_firmware v200r001c30spc800t
huawei vp9660_firmware v200r001c30spc900
huawei vp9660_firmware v200r001c30spca00
huawei vp9660_firmware v200r001c30spca00t
huawei vp9660_firmware v200r001c30spca01
huawei vp9660_firmware v200r001c30spca01t
huawei vp9660_firmware v200r001c30spca02t
huawei vp9660_firmware v200r001c30spcb00
huawei vp9660_firmware v200r001c30spcc00
huawei vp9660_firmware v200r001c30spcd00
huawei vp9660_firmware v200r001c30spcd00t
huawei vp9660_firmware v200r001c30spcd01t
huawei vp9660_firmware v200r001c30spcd02t
huawei vp9660_firmware v200r001c30spcd03t
huawei vp9660_firmware v200r001c30spcd04t
huawei vp9660_firmware v200r001c30spcd05t
huawei vp9660_firmware v200r001c30spce00
huawei vp9660_firmware v200r001c30spce01t
huawei vp9660_firmware v200r001c30spcf00
huawei vp9660_firmware v200r001c30spcg00
huawei vp9660_firmware v200r001c30spch00
huawei vp9660_firmware v200r001c30spci00
huawei vp9660_firmware v200r001c30spcj00
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c00spc001t
huawei vp9660_firmware v500r002c00spc200
huawei vp9660_firmware v500r002c00spc200t
huawei vp9660_firmware v500r002c00spc201t
huawei vp9660_firmware v500r002c00spc203t
huawei vp9660_firmware v500r002c00spc204t
huawei vp9660_firmware v500r002c00spc205t
huawei vp9660_firmware v500r002c00spc206t
huawei vp9660_firmware v500r002c00spc300
huawei vp9660_firmware v500r002c00spc400
huawei vp9660_firmware v500r002c00spc500
huawei vp9660_firmware v500r002c00spc600
huawei vp9660_firmware v500r002c00spc700
huawei vp9660_firmware v500r002c00spc800
huawei vp9660_firmware v500r002c00spc900
huawei vp9660_firmware v500r002c00spc900t
huawei vp9660_firmware v500r002c00spc901t
huawei vp9660_firmware v500r002c00spca00
huawei vp9660_firmware v500r002c00spcb00
huawei vp9660_firmware v500r002c00spcb01t
huawei vp9660_firmware v500r002c00spcc00
huawei vp9660_firmware v500r002c00spcd00
huawei vp9660_firmware v500r002c00t
huawei vp9660_firmware v500r002c10
huawei vp9660_firmware v500r002c10spc100
huawei vp9660_firmware v500r002c10spc100t
huawei vp9660_firmware v500r002c10t
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03b013sp02
huawei viewpoint_8660_firmware v100r008c03b013sp03
huawei viewpoint_8660_firmware v100r008c03b013sp04
huawei viewpoint_8660_firmware v100r008c03spc100
huawei viewpoint_8660_firmware v100r008c03spc200
huawei viewpoint_8660_firmware v100r008c03spc300
huawei viewpoint_8660_firmware v100r008c03spc400
huawei viewpoint_8660_firmware v100r008c03spc500
huawei viewpoint_8660_firmware v100r008c03spc600
huawei viewpoint_8660_firmware v100r008c03spc700
huawei viewpoint_8660_firmware v100r008c03spc800
huawei viewpoint_8660_firmware v100r008c03spc900
huawei viewpoint_8660_firmware v100r008c03spca00
huawei viewpoint_8660_firmware v100r008c03spcb00
huawei viewpoint_8660_firmware v100r008c03spcc00
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02spc100
huawei viewpoint_9030_firmware v100r011c03b012sp15
huawei viewpoint_9030_firmware v100r011c03b012sp16
huawei viewpoint_9030_firmware v100r011c03b015sp03
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100
huawei viewpoint_9030_firmware v100r011c03lgwl01spc100b012
huawei viewpoint_9030_firmware v100r011c03spc100
huawei viewpoint_9030_firmware v100r011c03spc200
huawei viewpoint_9030_firmware v100r011c03spc300
huawei viewpoint_9030_firmware v100r011c03spc400
huawei viewpoint_9030_firmware v100r011c03spc500
huawei viewpoint_9030 -
huawei espace_u1910_firmware v100r001c20spc300
huawei espace_u1910_firmware v100r001c20spc400
huawei espace_u1910_firmware v100r001c20spc500
huawei espace_u1910_firmware v100r001c20spc600
huawei espace_u1910_firmware v100r001c20sph703
huawei espace_u1910_firmware v200r003c00
huawei espace_u1910_firmware v200r003c20
huawei espace_u1910_firmware v200r003c30
huawei espace_u1910 -
huawei espace_u1911_firmware v100r001c20spc300
huawei espace_u1911_firmware v100r001c20spc400
huawei espace_u1911_firmware v100r001c20spc500
huawei espace_u1911_firmware v100r001c20spc600
huawei espace_u1911_firmware v100r001c20sph309
huawei espace_u1911_firmware v100r001c20sph703
huawei espace_u1911_firmware v200r003c00
huawei espace_u1911_firmware v200r003c20
huawei espace_u1911_firmware v200r003c30
huawei espace_u1911 -
huawei espace_u1930_firmware v100r001c20spc300
huawei espace_u1930_firmware v100r001c20spc400
huawei espace_u1930_firmware v100r001c20spc500
huawei espace_u1930_firmware v100r001c20spc600
huawei espace_u1930_firmware v100r001c20sph703
huawei espace_u1930_firmware v200r003c00
huawei espace_u1930_firmware v200r003c20
huawei espace_u1930_firmware v200r003c30
huawei espace_u1930 -
huawei espace_u1960_firmware v100r001c01spc500
huawei espace_u1960_firmware v100r001c20lcrw01t
huawei espace_u1960_firmware v100r001c20spc300
huawei espace_u1960_firmware v100r001c20spc400
huawei espace_u1960_firmware v100r001c20spc600
huawei espace_u1960_firmware v100r001c20spc600t
huawei espace_u1960_firmware v100r001c20sph309
huawei espace_u1960_firmware v100r001c20sph703
huawei espace_u1960_firmware v200r003c00
huawei espace_u1960_firmware v200r003c20
huawei espace_u1960_firmware v200r003c30
huawei espace_u1960 -
huawei espace_u1980_firmware v100r001c01spc500t
huawei espace_u1980_firmware v100r001c20spc300
huawei espace_u1980_firmware v100r001c20spc400
huawei espace_u1980_firmware v100r001c20spc500t
huawei espace_u1980_firmware v100r001c20spc502
huawei espace_u1980_firmware v100r001c20spc600
huawei espace_u1980_firmware v100r001c20sph309
huawei espace_u1980_firmware v100r001c20sph703
huawei espace_u1980_firmware v200r003c00
huawei espace_u1980_firmware v200r003c20
huawei espace_u1980_firmware v200r003c30
huawei espace_u1980 -
huawei espace_u1981_firmware v100r001c20spc300
huawei espace_u1981_firmware v100r001c20spc400
huawei espace_u1981_firmware v100r001c20spc500
huawei espace_u1981_firmware v100r001c20spc600
huawei espace_u1981_firmware v100r001c20spc700
huawei espace_u1981_firmware v100r001c20sph702
huawei espace_u1981_firmware v100r001c20sph703
huawei espace_u1981_firmware v100r001c30
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*",
                     matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*",
                     matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*",
                     matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*",
                     matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*",
                     matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*",
                     matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*",
                     matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*",
                     matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*",
                     matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*",
                     matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*",
                     matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*",
                     matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*",
                     matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*",
                     matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*",
                     matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*",
                     matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*",
                     matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
      },
      {
         lang: "es",
         value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   id: "CVE-2019-19416",
   lastModified: "2024-11-21T04:34:44.310",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-08T17:15:09.577",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15337",
   lastModified: "2024-11-21T03:14:29.633",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.610",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30 y V500R001C60SPC500; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600 y V500R001C60SPC500, presentan una vulnerabilidad de que el módulo IPSec maneja un mensaje inapropiadamente. Los atacantes pueden enviar mensajes específicos para causar una doble liberación de memoria. Esto puede comprometer el servicio normal.",
      },
   ],
   id: "CVE-2020-1829",
   lastModified: "2024-11-21T05:11:26.960",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T21:15:12.850",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de fuga de memoria debido a un error de liberación de memoria derivado de una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para provocar una fuga de memoria, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17153",
   lastModified: "2024-11-21T03:17:35.667",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.720",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:40
Summary
There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r005c00spc100
huawei usg9500_firmware v500r005c00spc200
huawei usg9500_firmware v500r005c20spc300
huawei usg9500_firmware v500r005c20spc500
huawei usg9500_firmware v500r005c20spc600
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF50C46B-73B1-4702-B9A5-8690DE89F81A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "4106345E-7FC8-4B6A-8BD4-A09340411BDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5AE3B9-1AE9-4DA6-8A62-720EF3B40B4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad en alguna versión de USG9500 de que el dispositivo maneja inapropiadamente la información cuando un usuario inicia sesión en el dispositivo. El atacante puede explotar la vulnerabilidad para llevar a cabo alguna operación y puede conseguir información y causar un filtrado de información",
      },
   ],
   id: "CVE-2020-9212",
   lastModified: "2024-11-21T05:40:10.563",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-22T18:15:14.293",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-27 13:15
Modified
2024-11-21 05:49
Summary
There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500_firmware v500r005c00spc200
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de error de gestión de recursos en las versiones V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 del dispositivo USG9500. Un atacante con autenticación necesita llevar a cabo operaciones específicas para explotar la vulnerabilidad en el dispositivo afectado. Debido a una gestión inapropiada de los recursos de la función, la vulnerabilidad puede ser explotada para causar un servicio anormal en los dispositivos afectados",
      },
   ],
   id: "CVE-2021-22360",
   lastModified: "2024-11-21T05:49:58.483",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-27T13:15:07.930",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-12-24 16:15
Modified
2024-11-21 05:40
Summary
There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de lectura fuera de límites en algunas versiones de NIP6800, Secospace USG6600 y USG9500. El software lee los datos más allá del final del búfer previsto cuando se analizan los mensajes DHCP, incluyendo el parámetro diseñado. Una explotación con éxito podría causar un servicio anormal",
      },
   ],
   id: "CVE-2020-9201",
   lastModified: "2024-11-21T05:40:09.053",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-12-24T16:15:16.147",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Summary
Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.",
      },
      {
         lang: "es",
         value: "Los Productos de Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; Secospace USG6600 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100; y USG9500 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de denegación de servicio. Los atacantes necesitan llevar a cabo una serie de operaciones en un escenario especial para explotar esta vulnerabilidad. Una explotación con éxito puede causar que las nuevas conexiones no puedan ser establecidas, lo que resulta en una denegación de servicio.",
      },
   ],
   id: "CVE-2020-1858",
   lastModified: "2024-11-21T05:11:29.840",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T20:15:11.710",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
      },
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-04-08 19:15
Modified
2024-11-21 05:49
Summary
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r005c00spc100
huawei ips_module_firmware v500r005c00spc200
huawei ips_module -
huawei ngfw_module_firmware v500r005c00spc100
huawei ngfw_module_firmware v500r005c00spc200
huawei ngfw_module -
huawei secospace_usg6300_firmware v500r001c30spc200
huawei secospace_usg6300_firmware v500r001c30spc600
huawei secospace_usg6300_firmware v500r001c60spc500
huawei secospace_usg6300_firmware v500r005c00spc100
huawei secospace_usg6300_firmware v500r005c00spc200
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c30spc200
huawei secospace_usg6500_firmware v500r001c30spc600
huawei secospace_usg6500_firmware v500r001c60spc500
huawei secospace_usg6500_firmware v500r005c00spc100
huawei secospace_usg6500_firmware v500r005c00spc200
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600_firmware v500r005c00spc200
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500_firmware v500r005c00spc200
huawei usg9500 -
huawei nip6300_firmware v500r001c30spc200
huawei nip6300_firmware v500r001c30spc600
huawei nip6300_firmware v500r001c60spc500
huawei nip6300_firmware v500r005c00spc100
huawei nip6300_firmware v500r005c00spc200
huawei nip6300 -
huawei nip6600_firmware v500r001c30spc200
huawei nip6600_firmware v500r001c30spc600
huawei nip6600_firmware v500r001c60spc500
huawei nip6600_firmware v500r005c00spc100
huawei nip6600_firmware v500r005c00spc200
huawei nip6600 -
huawei nip6800_firmware v500r001c30spc200
huawei nip6800_firmware v500r001c30spc600
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800_firmware v500r005c00spc200
huawei nip6800 -
huawei usg6000e_firmware v600r006c00
huawei usg6000e -
huawei nip6000e_firmware v600r006c00
huawei nip6000e -
huawei ips6000e_firmware v600r006c00
huawei ips6000e -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D4E285D-09FB-4123-B46A-E27818ADFFDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A659FF-6019-48F8-BF60-D9FC79682435",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "29134400-23E7-4888-B027-A29167E95693",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE35922-612B-437B-8044-56FA301E73C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "848014B8-8D79-48C3-8ED2-EA98378428F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E86EACC-53A8-4216-80D4-BD1BB215E151",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9FE889E-58A9-4D93-8054-7B845C44BDA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC2F5B2E-5233-4B9F-BA85-0D369C1A8805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B19CF4-92DF-4BB5-B9C7-76901EC5673C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC26B79E-CBCD-4D93-A552-1A20B155F0FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "46A3FD77-200C-40D7-A31E-6D964F9A375E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "024AA4AA-8A09-4E0B-81A0-76E2960A15FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FB28A28-8766-4A28-B438-117944ABD294",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDFB70C7-8E9A-4538-A4FF-6FA820D895CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000e_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "261DD2F0-5503-4939-9761-DA1219DD5633",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "821F3BBF-CFD5-41E5-9D30-9FEBA1EE4429",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6000e_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F666919C-2378-4D61-AF77-428F689E8071",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6000e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F76C1B-1214-4A55-926C-AB0AF7333481",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips6000e_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0D1B96D-834B-4B64-B026-AB2F156C8A67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips6000e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "609D868B-E091-49BD-A632-54DB6BBC9092",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad filtrado de memoria en algunos productos de Huawei. Un atacante remoto autenticado puede explotar esta vulnerabilidad mediante el envío de un mensaje específico al producto afectado. Debido a que no se libera la memoria asignada apropiadamente, una explotación con éxito puede causar que el servicio sea anormal. Los productos afectados incluyen algunas versiones de IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 y USG9500",
      },
   ],
   id: "CVE-2021-22312",
   lastModified: "2024-11-21T05:49:53.430",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-08T19:15:12.727",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-13 15:15
Modified
2024-11-21 05:11
Summary
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de denegación de servicio en algunos productos de Huawei. No existe protección contra el escenario de ataque de un protocolo específico. Un atacante remoto y no autorizado puede construir escenarios de ataque, lo que conlleva a una denegación de servicio. Las versiones del producto afectadas incluyen: NIP6300 versiones V500R001C30, V500R001C60; NIP6600 versiones V500R001C30, V500R001C60; Secospace USG6300 versiones V500R500C30, V500R001C60; Secospace USRG6500C versiones V500R001C30, V500R001C60; USG9500 versiones V500R001C30, V500R001C60",
      },
   ],
   id: "CVE-2020-1847",
   lastModified: "2024-11-21T05:11:29.093",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-13T15:15:12.283",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17251",
   lastModified: "2024-11-21T03:17:42.703",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.277",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.",
      },
      {
         lang: "es",
         value: "NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100,  presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando el administrador inicia sesión en el dispositivo y lleva a cabo algunas operaciones. Una explotación con éxito podría causar el reinicio de un determinado proceso.",
      },
   ],
   id: "CVE-2020-1877",
   lastModified: "2024-11-21T05:11:31.740",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.9,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:12.107",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-824",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de denegación de servicio debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para provocar un acceso no autorizado a la memoria, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17154",
   lastModified: "2024-11-21T03:17:35.817",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.767",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.",
      },
      {
         lang: "es",
         value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Esta vulnerabilidad se debe a una protección de de verificación de paquetes insuficiente. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando paquetes manipulados. Una explotación con éxito podría provocar una fuga de memoria y una condición de denegación de servicio (DoS) en un dispositivo afectado.",
      },
   ],
   id: "CVE-2017-15332",
   lastModified: "2024-11-21T03:14:28.893",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.377",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar un acceso a la memoria fuera de límites, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17157",
   lastModified: "2024-11-21T03:17:36.247",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.923",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-18 02:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de desreferencia del puntero Dangling. Un atacante autenticado puede llevar a cabo algunas operaciones especiales en los productos afectados en algunos escenarios especiales para explotar está vulnerabilidad. Debido a condiciones de carrera inapropiadas de diferentes operaciones, una explotación con éxito conllevará a una desreferencia del puntero Dangling, causando algún servicio anormal.",
      },
   ],
   id: "CVE-2020-1814",
   lastModified: "2024-11-21T05:11:25.960",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.6,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-18T02:15:10.703",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
            {
               lang: "en",
               value: "CWE-362",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei max_presence_firmware v100r001c00
huawei max_presence -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00spc200
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei smc2.0_firmware v100r003c10
huawei smc2.0_firmware v100r005c00
huawei smc2.0_firmware v500r002c00
huawei smc2.0_firmware v500r002c00t
huawei smc2.0_firmware v600r006c00
huawei smc2.0_firmware v600r006c00t
huawei smc2.0 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.",
      },
      {
         lang: "es",
         value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado podría enviar paquetes manipulados a los productos afectados. Dada la verificación insuficiente de los paquetes, una explotación exitosa podría hacer que el proceso se reinicie.",
      },
   ],
   id: "CVE-2017-15331",
   lastModified: "2024-11-21T03:14:28.733",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.330",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
      },
      {
         lang: "es",
         value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de fuga de información. Un atacante puede explotar esta vulnerabilidad mediante el envío de paquetes de petición específicos hacia los dispositivos afectados. Una explotación con éxito puede conllevar a una fuga de información.",
      },
   ],
   id: "CVE-2020-1827",
   lastModified: "2024-11-21T05:11:26.723",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T21:15:12.757",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-404",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v200r003c20spc900
huawei espace_u1981_firmware v200r003c30spc200
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría enviar paquetes SIP especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los paquetes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-17295",
   lastModified: "2024-11-21T03:17:46.440",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:03.313",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c20
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c0
huawei rp200 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei vp9660_firmware v200r001c02
huawei vp9660_firmware v200r001c30
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v100r001c20
huawei espace_u1981_firmware v200r003c00
huawei espace_u1981_firmware v200r003c20
huawei espace_u1981_firmware v200r003c30
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
      },
      {
         lang: "es",
         value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.",
      },
   ],
   id: "CVE-2017-15336",
   lastModified: "2024-11-21T03:14:29.480",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:00.563",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de escritura fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar una escritura en memoria fuera de límites, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17152",
   lastModified: "2024-11-21T03:17:35.517",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.657",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Summary
Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "10423C71-8077-4381-AE42-C0934BF37DA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "225678FC-8643-40CB-BB08-2E9B68B58217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
      },
      {
         lang: "es",
         value: "Los módulos Huawei NGFW, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600 y USG9500 versiones V500R001C30, V500R001C60 y V500R005C00, presentan una vulnerabilidad de fuga de información. Un atacante puede explotar esta vulnerabilidad mediante el envío de paquetes de peticiones específicos hacia los dispositivos afectados. Una explotación con éxito puede conllevar a una fuga de información.",
      },
   ],
   id: "CVE-2020-1856",
   lastModified: "2024-11-21T05:11:29.587",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-17T21:15:13.117",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-01-13 23:15
Modified
2024-11-21 05:11
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C986370-A4E1-4EA0-BA3E-122F4D16D3F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de lectura fuera de límites en varios productos. El software lee los datos más allá del final del búfer previsto cuando se analizan determinados mensajes DHCP diseñados. Una explotación con éxito podría causar un servicio anormal. versiones afectadas de productos incluyen: NIP6800 versiones V500R001C30, V500R001C30,V500R001C60; SPC500 versiones V500R005C00; S12700 versiones V200R008C00; S2700 versiones V200R008C00; S5700 versiones V200R008C00; S6700 versiones V200R008C00; S7700 versiones V200R008C00; S9700 versiones V200R008C00; Secospace USG6600 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC300 versiones V500R001C30; SPC600 versiones V500R001C60 y SPC500 versiones V500R005C00",
      },
   ],
   id: "CVE-2020-1866",
   lastModified: "2024-11-21T05:11:30.670",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-01-13T23:15:13.367",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.
Impacted products
Vendor Product Version
huawei nip6800_firmware v500r001c30
huawei nip6800_firmware v500r001c60spc500
huawei nip6800_firmware v500r005c00spc100
huawei nip6800 -
huawei secospace_usg6600_firmware v500r001c30spc200
huawei secospace_usg6600_firmware v500r001c30spc600
huawei secospace_usg6600_firmware v500r001c60spc500
huawei secospace_usg6600_firmware v500r005c00spc100
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.",
      },
      {
         lang: "es",
         value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de lectura fuera de límites. Un atacante no autenticado diseña un mensaje malformado con un parámetro especifico y envía el mensaje hacia los productos afectados. Debido a una comprobación insuficiente del mensaje, que puede ser explotada para causar el reinicio del dispositivo.",
      },
   ],
   id: "CVE-2020-1873",
   lastModified: "2024-11-21T05:11:31.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-28T19:15:11.827",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados con parámetros específicos y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17252",
   lastModified: "2024-11-21T03:17:42.880",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.337",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rp200_firmware v500r002c00
huawei rp200_firmware v600r006c00
huawei rp200 -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei espace_u1981_firmware v200r003c20spc900
huawei espace_u1981_firmware v200r003c30spc200
huawei espace_u1981 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de fuga de memoria. Un atacante remoto no autenticado podría enviar paquetes H323 especialmente manipulados a los productos afectados. Dado que no se libera la memoria asignada correctamente para gestionar los paquetes, una explotación con éxito podría provocar una fuga de memoria y que algunos servicios funcionen de manera errónea.",
      },
   ],
   id: "CVE-2017-17296",
   lastModified: "2024-11-21T03:17:46.610",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:03.360",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar un acceso a la memoria fuera de límites, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17156",
   lastModified: "2024-11-21T03:17:36.103",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.877",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c00spc200
huawei ips_module_firmware v500r001c00spc300
huawei ips_module_firmware v500r001c00spc500
huawei ips_module_firmware v500r001c00sph303
huawei ips_module_firmware v500r001c00sph508
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c20spc100
huawei ips_module_firmware v500r001c20spc100pwe
huawei ips_module_firmware v500r001c20spc200
huawei ips_module_firmware v500r001c20spc200b062
huawei ips_module_firmware v500r001c20spc200pwe
huawei ips_module_firmware v500r001c20spc300b078
huawei ips_module_firmware v500r001c20spc300pwe
huawei ips_module -
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c00spc200
huawei ngfw_module_firmware v500r001c00spc300
huawei ngfw_module_firmware v500r001c00spc500
huawei ngfw_module_firmware v500r001c00spc500pwe
huawei ngfw_module_firmware v500r001c00sph303
huawei ngfw_module_firmware v500r001c00sph508
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r001c20spc100
huawei ngfw_module_firmware v500r001c20spc100pwe
huawei ngfw_module_firmware v500r001c20spc200
huawei ngfw_module_firmware v500r001c20spc200b062
huawei ngfw_module_firmware v500r001c20spc200pwe
huawei ngfw_module_firmware v500r001c20spc300b078
huawei ngfw_module_firmware v500r001c20spc300pwe
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c00spc200
huawei nip6300_firmware v500r001c00spc300
huawei nip6300_firmware v500r001c00spc500
huawei nip6300_firmware v500r001c00sph303
huawei nip6300_firmware v500r001c00sph508
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c20spc100
huawei nip6300_firmware v500r001c20spc100pwe
huawei nip6300_firmware v500r001c20spc200
huawei nip6300_firmware v500r001c20spc200b062
huawei nip6300_firmware v500r001c20spc200pwe
huawei nip6300_firmware v500r001c20spc300b078
huawei nip6300_firmware v500r001c20spc300pwe
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c00spc200
huawei nip6600_firmware v500r001c00spc300
huawei nip6600_firmware v500r001c00spc500
huawei nip6600_firmware v500r001c00sph303
huawei nip6600_firmware v500r001c00sph508
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c20spc100
huawei nip6600_firmware v500r001c20spc100pwe
huawei nip6600_firmware v500r001c20spc200
huawei nip6600_firmware v500r001c20spc200b062
huawei nip6600_firmware v500r001c20spc200pwe
huawei nip6600_firmware v500r001c20spc300b078
huawei nip6600 -
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c00spc200
huawei secospace_usg6300_firmware v500r001c00spc300
huawei secospace_usg6300_firmware v500r001c00spc500
huawei secospace_usg6300_firmware v500r001c00spc500pwe
huawei secospace_usg6300_firmware v500r001c00sph303
huawei secospace_usg6300_firmware v500r001c00sph508
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c20spc100
huawei secospace_usg6300_firmware v500r001c20spc100pwe
huawei secospace_usg6300_firmware v500r001c20spc101
huawei secospace_usg6300_firmware v500r001c20spc200
huawei secospace_usg6300_firmware v500r001c20spc200b062
huawei secospace_usg6300_firmware v500r001c20spc200pwe
huawei secospace_usg6300_firmware v500r001c20spc300b078
huawei secospace_usg6300_firmware v500r001c20spc300pwe
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c00spc200
huawei secospace_usg6500_firmware v500r001c00spc300
huawei secospace_usg6500_firmware v500r001c00spc500
huawei secospace_usg6500_firmware v500r001c00spc500pwe
huawei secospace_usg6500_firmware v500r001c00sph303
huawei secospace_usg6500_firmware v500r001c00sph508
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c20spc100
huawei secospace_usg6500_firmware v500r001c20spc100pwe
huawei secospace_usg6500_firmware v500r001c20spc101
huawei secospace_usg6500_firmware v500r001c20spc200
huawei secospace_usg6500_firmware v500r001c20spc200b062
huawei secospace_usg6500_firmware v500r001c20spc200pwe
huawei secospace_usg6500_firmware v500r001c20spc300b078
huawei secospace_usg6500_firmware v500r001c20spc300pwe
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c00spc100
huawei secospace_usg6600_firmware v500r001c00spc200
huawei secospace_usg6600_firmware v500r001c00spc300
huawei secospace_usg6600_firmware v500r001c00spc301
huawei secospace_usg6600_firmware v500r001c00spc500
huawei secospace_usg6600_firmware v500r001c00spc500pwe
huawei secospace_usg6600_firmware v500r001c00sph303
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c20spc100
huawei secospace_usg6600_firmware v500r001c20spc100pwe
huawei secospace_usg6600_firmware v500r001c20spc101
huawei secospace_usg6600_firmware v500r001c20spc200
huawei secospace_usg6600_firmware v500r001c20spc200pwe
huawei secospace_usg6600_firmware v500r001c20spc300
huawei secospace_usg6600_firmware v500r001c20spc300b078
huawei secospace_usg6600_firmware v500r001c20spc300pwe
huawei secospace_usg6600 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c00spc200
huawei usg9500_firmware v500r001c00spc300
huawei usg9500_firmware v500r001c00spc303
huawei usg9500_firmware v500r001c00spc500
huawei usg9500_firmware v500r001c00spc500pwe
huawei usg9500_firmware v500r001c00sph303
huawei usg9500_firmware v500r001c00sph508
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c20spc100
huawei usg9500_firmware v500r001c20spc100pwe
huawei usg9500_firmware v500r001c20spc101
huawei usg9500_firmware v500r001c20spc200
huawei usg9500_firmware v500r001c20spc200b062
huawei usg9500_firmware v500r001c20spc200pwe
huawei usg9500_firmware v500r001c20spc300b078
huawei usg9500_firmware v500r001c20spc300pwe
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*",
                     matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*",
                     matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
      },
      {
         lang: "es",
         value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido al incumplimiento del requerimiento de alineación de 4 bytes impuesto por la CPU de MIPS. Un atacante podría aprovecharse de esto para provocar un acceso no autorizado a la memoria, lo que podría conducir a excepciones del sistema.",
      },
   ],
   id: "CVE-2017-17155",
   lastModified: "2024-11-21T03:17:35.967",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-02-15T16:29:01.830",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de gestión de recursos en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados si se fracasa a la hora de solicitarlos a la memoria. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17258",
   lastModified: "2024-11-21T03:17:43.903",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.713",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
huawei ar120-s_firmware v200r006c10
huawei ar120-s_firmware v200r007c00
huawei ar120-s_firmware v200r008c20
huawei ar120-s_firmware v200r008c30
huawei ar120-s -
huawei ar1200_firmware v200r006c10
huawei ar1200_firmware v200r006c13
huawei ar1200_firmware v200r007c00
huawei ar1200_firmware v200r007c01
huawei ar1200_firmware v200r007c02
huawei ar1200_firmware v200r008c20
huawei ar1200_firmware v200r008c30
huawei ar1200 -
huawei ar1200-s_firmware v200r006c10
huawei ar1200-s_firmware v200r007c00
huawei ar1200-s_firmware v200r008c20
huawei ar1200-s_firmware v200r008c30
huawei ar1200-s -
huawei ar150_firmware v200r006c10
huawei ar150_firmware v200r007c00
huawei ar150_firmware v200r007c01
huawei ar150_firmware v200r007c02
huawei ar150_firmware v200r008c20
huawei ar150_firmware v200r008c30
huawei ar150 -
huawei ar150-s_firmware v200r006c10spc300
huawei ar150-s_firmware v200r007c00
huawei ar150-s_firmware v200r008c20
huawei ar150-s_firmware v200r008c30
huawei ar150-s -
huawei ar160_firmware v200r006c10
huawei ar160_firmware v200r006c12
huawei ar160_firmware v200r007c00
huawei ar160_firmware v200r007c01
huawei ar160_firmware v200r007c02
huawei ar160_firmware v200r008c20
huawei ar160_firmware v200r008c30
huawei ar160 -
huawei ar200_firmware v200r006c10
huawei ar200_firmware v200r007c00
huawei ar200_firmware v200r007c01
huawei ar200_firmware v200r008c20
huawei ar200_firmware v200r008c30
huawei ar200 -
huawei ar200-s_firmware v200r006c10
huawei ar200-s_firmware v200r007c00
huawei ar200-s_firmware v200r008c20
huawei ar200-s_firmware v200r008c30
huawei ar200-s -
huawei ar2200_firmware v200r006c10
huawei ar2200_firmware v200r006c13
huawei ar2200_firmware v200r006c16pwe
huawei ar2200_firmware v200r007c00
huawei ar2200_firmware v200r007c01
huawei ar2200_firmware v200r007c02
huawei ar2200_firmware v200r008c20
huawei ar2200_firmware v200r008c30
huawei ar2200 -
huawei ar2200-s_firmware v200r006c10
huawei ar2200-s_firmware v200r007c00
huawei ar2200-s_firmware v200r008c20
huawei ar2200-s_firmware v200r008c30
huawei ar2200-s -
huawei ar3200_firmware v200r006c10
huawei ar3200_firmware v200r006c11
huawei ar3200_firmware v200r007c00
huawei ar3200_firmware v200r007c01
huawei ar3200_firmware v200r007c02
huawei ar3200_firmware v200r008c00
huawei ar3200_firmware v200r008c10
huawei ar3200_firmware v200r008c20
huawei ar3200_firmware v200r008c30
huawei ar3200 -
huawei ar3600_firmware v200r006c10
huawei ar3600_firmware v200r007c00
huawei ar3600_firmware v200r007c01
huawei ar3600_firmware v200r008c20
huawei ar3600 -
huawei ar510_firmware v200r006c10
huawei ar510_firmware v200r006c12
huawei ar510_firmware v200r006c13
huawei ar510_firmware v200r006c15
huawei ar510_firmware v200r006c16
huawei ar510_firmware v200r006c17
huawei ar510_firmware v200r007c00spc180t
huawei ar510_firmware v200r008c20
huawei ar510_firmware v200r008c30
huawei ar510 -
huawei dp300_firmware v500r002c00
huawei dp300 -
huawei ips_module_firmware v100r001c10spc200
huawei ips_module_firmware v100r001c30
huawei ips_module_firmware v500r001c00
huawei ips_module_firmware v500r001c20
huawei ips_module_firmware v500r001c30
huawei ips_module_firmware v500r001c50
huawei ips_module -
huawei ngfw_module_firmware v100r001c10spc200
huawei ngfw_module_firmware v100r001c20
huawei ngfw_module_firmware v100r001c30
huawei ngfw_module_firmware v500r001c00
huawei ngfw_module_firmware v500r001c20
huawei ngfw_module_firmware v500r002c00
huawei ngfw_module_firmware v500r002c10
huawei ngfw_module -
huawei nip6300_firmware v500r001c00
huawei nip6300_firmware v500r001c20
huawei nip6300_firmware v500r001c30
huawei nip6300_firmware v500r001c50
huawei nip6300 -
huawei nip6600_firmware v500r001c00
huawei nip6600_firmware v500r001c20
huawei nip6600_firmware v500r001c30
huawei nip6600_firmware v500r001c50
huawei nip6600 -
huawei nip6800_firmware v500r001c50
huawei nip6800 -
huawei netengine16ex_firmware v200r006c10
huawei netengine16ex_firmware v200r007c00
huawei netengine16ex_firmware v200r008c20
huawei netengine16ex_firmware v200r008c30
huawei netengine16ex -
huawei rse6500_firmware v500r002c00
huawei rse6500 -
huawei srg1300_firmware v200r006c10
huawei srg1300_firmware v200r007c00
huawei srg1300_firmware v200r007c02
huawei srg1300_firmware v200r008c20
huawei srg1300_firmware v200r008c30
huawei srg1300 -
huawei srg2300_firmware v200r006c10
huawei srg2300_firmware v200r007c00
huawei srg2300_firmware v200r007c02
huawei srg2300_firmware v200r008c20
huawei srg2300_firmware v200r008c30
huawei srg2300 -
huawei srg3300_firmware v200r006c10
huawei srg3300_firmware v200r007c00
huawei srg3300_firmware v200r007c02
huawei srg3300_firmware v200r008c20
huawei srg3300_firmware v200r008c30
huawei srg3300 -
huawei svn5600_firmware v200r003c00
huawei svn5600_firmware v200r003c10
huawei svn5600 -
huawei svn5800_firmware v200r003c00
huawei svn5800_firmware v200r003c10
huawei svn5800 -
huawei svn5800-c_firmware v200r003c00
huawei svn5800-c_firmware v200r003c10
huawei svn5800-c -
huawei semg9811_firmware v300r001c01
huawei semg9811 -
huawei secospace_usg6300_firmware v100r001c10
huawei secospace_usg6300_firmware v100r001c20
huawei secospace_usg6300_firmware v100r001c30
huawei secospace_usg6300_firmware v500r001c00
huawei secospace_usg6300_firmware v500r001c20
huawei secospace_usg6300_firmware v500r001c30
huawei secospace_usg6300_firmware v500r001c50
huawei secospace_usg6300 -
huawei secospace_usg6500_firmware v100r001c10
huawei secospace_usg6500_firmware v100r001c20
huawei secospace_usg6500_firmware v100r001c30
huawei secospace_usg6500_firmware v500r001c00
huawei secospace_usg6500_firmware v500r001c20
huawei secospace_usg6500_firmware v500r001c30
huawei secospace_usg6500_firmware v500r001c50
huawei secospace_usg6500 -
huawei secospace_usg6600_firmware v100r001c00spc200
huawei secospace_usg6600_firmware v100r001c10
huawei secospace_usg6600_firmware v100r001c20
huawei secospace_usg6600_firmware v100r001c30
huawei secospace_usg6600_firmware v500r001c00
huawei secospace_usg6600_firmware v500r001c20
huawei secospace_usg6600_firmware v500r001c30
huawei secospace_usg6600_firmware v500r001c50
huawei secospace_usg6600_firmware v500r001c60
huawei secospace_usg6600 -
huawei te30_firmware v100r001c02
huawei te30_firmware v100r001c10
huawei te30_firmware v500r002c00
huawei te30_firmware v600r006c00
huawei te30 -
huawei te40_firmware v500r002c00
huawei te40_firmware v600r006c00
huawei te40 -
huawei te50_firmware v500r002c00
huawei te50_firmware v600r006c00
huawei te50 -
huawei tp3106_firmware v100r002c00
huawei tp3106 -
huawei tp3206_firmware v100r002c00
huawei tp3206_firmware v100r002c10
huawei tp3206 -
huawei usg9500_firmware v500r001c00
huawei usg9500_firmware v500r001c20
huawei usg9500_firmware v500r001c30
huawei usg9500_firmware v500r001c50
huawei usg9500 -
huawei usg9520_firmware v300r001c01
huawei usg9520_firmware v300r001c20
huawei usg9520 -
huawei usg9560_firmware v300r001c01
huawei usg9560_firmware v300r001c20
huawei usg9560 -
huawei usg9580_firmware v300r001c01
huawei usg9580_firmware v300r001c20
huawei usg9580 -
huawei viewpoint_9030_firmware v100r011c02
huawei viewpoint_9030_firmware v100r011c03
huawei viewpoint_9030 -
huawei te60_firmware v100r001c01
huawei te60_firmware v100r001c10
huawei te60_firmware v500r002c00
huawei te60_firmware v600r006c00
huawei te60 -
huawei usg6000v_firmware v500r001c20
huawei usg6000v -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -
huawei viewpoint_8660_firmware v100r008c03
huawei viewpoint_8660 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*",
                     matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*",
                     matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*",
                     matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
                     matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
                     matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
      },
      {
         lang: "es",
         value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.",
      },
   ],
   id: "CVE-2017-17255",
   lastModified: "2024-11-21T03:17:43.403",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T15:29:00.527",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-01-21 19:15
Modified
2024-11-21 04:34
Summary
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30spc100
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500_firmware v500r005c00spc200
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.",
      },
      {
         lang: "es",
         value: "El dispositivo USG9500 de HUAWEI con versiones de V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200, presentan una vulnerabilidad de filtrado de información. Debido a un procesamiento inapropiado del vector de inicialización usado en un algoritmo de cifrado específico, un atacante que consigue acceso a esta primitiva criptográfica puede explotar esta vulnerabilidad para causar que el valor de la confidencialidad asociada con su uso sea disminuido.",
      },
   ],
   id: "CVE-2019-19411",
   lastModified: "2024-11-21T04:34:43.393",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-21T19:15:13.113",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-665",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-01-03 15:15
Modified
2024-11-21 05:11
Summary
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
Impacted products
Vendor Product Version
huawei usg9500_firmware v500r001c30spc100
huawei usg9500_firmware v500r001c30spc200
huawei usg9500_firmware v500r001c30spc600
huawei usg9500_firmware v500r001c60spc500
huawei usg9500_firmware v500r005c00spc100
huawei usg9500_firmware v500r005c00spc200
huawei usg9500 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.",
      },
      {
         lang: "es",
         value: "USG9500 con software de versiones V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200, tiene una vulnerabilidad de administración de credenciales inapropiada. El software no administra apropiadamente determinadas credenciales. Una explotación con éxito podría causar una divulgación de información o daño, e impactar la confidencialidad o integridad.",
      },
   ],
   id: "CVE-2020-1871",
   lastModified: "2024-11-21T05:11:30.927",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-03T15:15:12.133",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

CVE-2020-1816 (GCVE-0-2020-1816)
Vulnerability from cvelistv5
Published
2020-02-17 23:24
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei Secospace USG6600, USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.940Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T23:24:30",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1816",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1816",
      datePublished: "2020-02-17T23:24:30",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.940Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1830 (GCVE-0-2020-1830)
Vulnerability from cvelistv5
Published
2020-02-17 23:35
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei Secospace USG6600, USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.948Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Small OOB Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T23:35:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1830",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Small OOB Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1830",
      datePublished: "2020-02-17T23:35:02",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.948Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-9137 (GCVE-0-2014-9137)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:33
Severity ?
Summary
Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
Impacted products
Vendor Product Version
n/a USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900, Version: USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:33:13.590Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CSRF",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-9137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CSRF",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-9137",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-11-28T00:00:00",
      dateUpdated: "2024-08-06T13:33:13.590Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15335 (GCVE-0-2017-15335)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.561Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15335",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15335",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.561Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17251 (GCVE-0-2017-17251)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.849Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "null pointer dereference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17251",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "null pointer dereference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17251",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.849Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1873 (GCVE-0-2020-1873)
Vulnerability from cvelistv5
Published
2020-02-28 18:14
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00SPC100
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.099Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:14:50",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1873",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1873",
      datePublished: "2020-02-28T18:14:50",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.099Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17296 (GCVE-0-2017-17296)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:51:30.556Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17296",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17296",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:51:30.556Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-8167 (GCVE-0-2017-8167)
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 03:27
Severity ?
Summary
Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:27:22.877Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
         ],
         datePublic: "2017-11-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-11-22T18:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-11-15T00:00:00",
               ID: "CVE-2017-8167",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-8167",
      datePublished: "2017-11-22T19:00:00Z",
      dateReserved: "2017-04-25T00:00:00",
      dateUpdated: "2024-09-17T03:27:28.877Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17135 (GCVE-0-2017-17135)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:31
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.923Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "null pointer reference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17135",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "null pointer reference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17135",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T00:31:13.342Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1866 (GCVE-0-2020-1866)
Vulnerability from cvelistv5
Published
2021-01-13 22:22
Modified
2024-08-04 06:53
Severity ?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
Impacted products
Vendor Product Version
n/a NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00
Version: V200R008C00
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.744Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out of Bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-13T22:22:04",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1866",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out of Bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1866",
      datePublished: "2021-01-13T22:22:04",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.744Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1860 (GCVE-0-2020-1860)
Vulnerability from cvelistv5
Published
2020-02-28 18:28
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.749Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Access Control Bypass",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:28:16",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1860",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Access Control Bypass",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1860",
      datePublished: "2020-02-28T18:28:16",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.749Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1876 (GCVE-0-2020-1876)
Vulnerability from cvelistv5
Published
2020-02-28 18:42
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.633Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:42:04",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1876",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1876",
      datePublished: "2020-02-28T18:42:04",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.633Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1875 (GCVE-0-2020-1875)
Vulnerability from cvelistv5
Published
2020-02-28 18:05
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.739Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Invalid Pointer Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:05:21",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1875",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Invalid Pointer Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1875",
      datePublished: "2020-02-28T18:05:21",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.739Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22342 (GCVE-0-2021-22342)
Vulnerability from cvelistv5
Published
2021-06-22 18:41
Modified
2024-08-03 18:37
Severity ?
Summary
There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.
Impacted products
Vendor Product Version
n/a IPS Module;NGFW Module;SeMG9811;USG9500 Version: V500R005C00,V500R005C10,V500R005C20
Version: V500R005C00
Version: V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.546Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module;NGFW Module;SeMG9811;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00,V500R005C10,V500R005C20",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-22T18:41:20",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22342",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module;NGFW Module;SeMG9811;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00,V500R005C10,V500R005C20",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C10,V500R005C20",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22342",
      datePublished: "2021-06-22T18:41:20",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.546Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17136 (GCVE-0-2017-17136)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-16 16:49
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.931Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "heap overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17136",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "heap overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17136",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-16T16:49:17.056Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17297 (GCVE-0-2017-17297)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:51:30.638Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17297",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17297",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:51:30.638Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9213 (GCVE-0-2020-9213)
Vulnerability from cvelistv5
Published
2021-03-22 17:39
Modified
2024-08-04 10:19
Severity ?
Summary
There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.
Impacted products
Vendor Product Version
n/a NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R005C00
Version: V500R001C30,V500R001C60,V500R005C00
Version: V500R001C60,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:20.091Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T17:39:26",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9213",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9213",
      datePublished: "2021-03-22T17:39:26",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:20.091Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1847 (GCVE-0-2020-1847)
Vulnerability from cvelistv5
Published
2020-11-13 14:50
Modified
2024-08-04 06:53
Severity ?
Summary
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
Impacted products
Vendor Product Version
n/a NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.650Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T14:50:23",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1847",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1847",
      datePublished: "2020-11-13T14:50:23",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.650Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1877 (GCVE-0-2020-1877)
Vulnerability from cvelistv5
Published
2020-02-28 18:48
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.801Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Invalid Pointer Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:48:56",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1877",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Invalid Pointer Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1877",
      datePublished: "2020-02-28T18:48:56",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.801Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15348 (GCVE-0-2017-15348)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500, Version: IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00,
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.590Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500,",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00,",
                  },
               ],
            },
         ],
         datePublic: "2017-11-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Insufficient Input Validation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15348",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Insufficient Input Validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15348",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.590Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9127 (GCVE-0-2020-9127)
Vulnerability from cvelistv5
Published
2020-11-13 14:46
Modified
2024-08-04 10:19
Severity ?
Summary
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
Impacted products
Vendor Product Version
n/a NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:20.035Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Command Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-13T14:46:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9127",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Command Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9127",
      datePublished: "2020-11-13T14:46:52",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:20.035Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15350 (GCVE-0-2017-15350)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:57
Severity ?
Summary
The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500, Version: DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R00 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:57:25.468Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500,",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R00 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15350",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15350",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:57:25.468Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22310 (GCVE-0-2021-22310)
Vulnerability from cvelistv5
Published
2021-03-22 18:38
Modified
2024-08-03 18:37
Severity ?
Summary
There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.
Impacted products
Vendor Product Version
n/a NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R001C00,V500R001C20,V500R001C30
Version: V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80
Version: V500R005C00,V500R005C10
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.540Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00,V500R001C20,V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00,V500R005C10",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T18:38:09",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22310",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C10",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22310",
      datePublished: "2021-03-22T18:38:09",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.540Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1874 (GCVE-0-2020-1874)
Vulnerability from cvelistv5
Published
2020-02-28 18:21
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00SPC100
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.532Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Invalid Pointer Access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-28T18:21:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1874",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Invalid Pointer Access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1874",
      datePublished: "2020-02-28T18:21:52",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.532Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-19415 (GCVE-0-2019-19415)
Vulnerability from cvelistv5
Published
2020-07-08 16:58
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:16:47.092Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR160",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16PWE",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C11",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
               ],
            },
            {
               product: "AR510",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C15",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16",
                  },
                  {
                     status: "affected",
                     version: "V200R006C17",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC180T",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "DP300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "IPS Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NGFW Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C10",
                  },
               ],
            },
            {
               product: "NIP6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NetEngine16EX",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "RSE6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "SMC2.0",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R003C00SPC200T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC301T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C10",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC101B001T",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC102",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC103",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC201T",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "SRG1300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG2300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG3300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SVN5600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800-C",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SeMG9811",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC700",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPCa00",
                  },
               ],
            },
            {
               product: "Secospace USG6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C00",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "SoftCo",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C01SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
               ],
            },
            {
               product: "TE30",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C02SPC200 V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE40",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE50",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE60",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC800",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00SPC200",
                  },
               ],
            },
            {
               product: "TP3206",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R002C00",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01",
                  },
                  {
                     status: "affected",
                     version: "V300R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "USG9520",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC800PWE",
                  },
               ],
            },
            {
               product: "USG9560",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C20SPC300",
                  },
               ],
            },
            {
               product: "VP9660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100B015T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101TB015",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC102T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC103T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC104T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200B022T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC201B023T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC202B025T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC203T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC206T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC207T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC208T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC209T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400B001",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC401T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC402T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC403T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC404T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC405T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC701T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC702T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC703T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa02T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCc00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd",
                  },
               ],
            },
            {
               product: "ViewPoint 8660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R008C03B013SP02",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP04",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC900",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCc00",
                  },
               ],
            },
            {
               product: "ViewPoint 9030",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R011C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP15",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP16",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B015SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100B012",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC500",
                  },
               ],
            },
            {
               product: "eSpace U1910",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1911",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1930",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1960",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20LCRW01T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1980",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC502",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1981",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH702",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-08T16:58:31",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-19415",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10SPC300",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR160",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR2200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C16PWE",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR2200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C11",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C10",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR510",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C15",
                                       },
                                       {
                                          version_value: "V200R006C16",
                                       },
                                       {
                                          version_value: "V200R006C17",
                                       },
                                       {
                                          version_value: "V200R007C00SPC180T",
                                       },
                                       {
                                          version_value: "V200R007C00SPC600",
                                       },
                                       {
                                          version_value: "V200R007C00SPC900",
                                       },
                                       {
                                          version_value: "V200R007C00SPCb00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "DP300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "IPS Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NGFW Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NetEngine16EX",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "RSE6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SMC2.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R003C00SPC200T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC300T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC301T",
                                       },
                                       {
                                          version_value: "V100R003C10",
                                       },
                                       {
                                          version_value: "V100R005C00SPC100",
                                       },
                                       {
                                          version_value: "V100R005C00SPC101B001T",
                                       },
                                       {
                                          version_value: "V100R005C00SPC102",
                                       },
                                       {
                                          version_value: "V100R005C00SPC103",
                                       },
                                       {
                                          version_value: "V100R005C00SPC200",
                                       },
                                       {
                                          version_value: "V100R005C00SPC201T",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG1300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG2300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG3300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800-C",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SeMG9811",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC500",
                                       },
                                       {
                                          version_value: "V300R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V300R001C01SPC700",
                                       },
                                       {
                                          version_value: "V300R001C01SPCa00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Secospace USG6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C00",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SoftCo",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C01SPC300",
                                       },
                                       {
                                          version_value: "V200R001C01SPC400",
                                       },
                                       {
                                          version_value: "V200R001C01SPC500",
                                       },
                                       {
                                          version_value: "V200R001C01SPC600",
                                       },
                                       {
                                          version_value: "V200R001C01SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00SPC100",
                                       },
                                       {
                                          version_value: "V200R003C00SPC200",
                                       },
                                       {
                                          version_value: "V200R003C00SPC300",
                                       },
                                       {
                                          version_value: "V200R003C00SPC500",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE30",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C02SPC100",
                                       },
                                       {
                                          version_value: "V100R001C02SPC200 V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE40",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE50",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "TE60",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC100",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C10SPC300",
                                       },
                                       {
                                          version_value: "V100R001C10SPC400",
                                       },
                                       {
                                          version_value: "V100R001C10SPC500",
                                       },
                                       {
                                          version_value: "V100R001C10SPC600",
                                       },
                                       {
                                          version_value: "V100R001C10SPC800",
                                       },
                                       {
                                          version_value: "V100R003C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C00SPC100",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC300",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC800",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCa00",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "V600R006C00SPC200",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TP3206",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01",
                                       },
                                       {
                                          version_value: "V300R001C20",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9520",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC800PWE",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9560",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C20SPC300",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "VP9660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C02SPC100",
                                       },
                                       {
                                          version_value: "V200R001C02SPC200",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300T",
                                       },
                                       {
                                          version_value: "V200R001C02SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100B015T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101TB015",
                                       },
                                       {
                                          version_value: "V200R001C30SPC102T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC103T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC104T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200B022T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC201B023T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC202B025T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC203T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC206T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC207T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC208T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC209T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC300",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400B001",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC401T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC402T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC403T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC404T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC405T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC600",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC701T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC702T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC703T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC900",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa02T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCb00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCc00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "ViewPoint 8660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R008C03B013SP02",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP03",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP04",
                                       },
                                       {
                                          version_value: "V100R008C03SPC100",
                                       },
                                       {
                                          version_value: "V100R008C03SPC200",
                                       },
                                       {
                                          version_value: "V100R008C03SPC300",
                                       },
                                       {
                                          version_value: "V100R008C03SPC400",
                                       },
                                       {
                                          version_value: "V100R008C03SPC500",
                                       },
                                       {
                                          version_value: "V100R008C03SPC600",
                                       },
                                       {
                                          version_value: "V100R008C03SPC700",
                                       },
                                       {
                                          version_value: "V100R008C03SPC800",
                                       },
                                       {
                                          version_value: "V100R008C03SPC900",
                                       },
                                       {
                                          version_value: "V100R008C03SPCa00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCb00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCc00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R011C02SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP15",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP16",
                                       },
                                       {
                                          version_value: "V100R011C03B015SP03",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100B012",
                                       },
                                       {
                                          version_value: "V100R011C03SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03SPC200",
                                       },
                                       {
                                          version_value: "V100R011C03SPC300",
                                       },
                                       {
                                          version_value: "V100R011C03SPC400",
                                       },
                                       {
                                          version_value: "V100R011C03SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1910",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1911",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1930",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "eSpace U1960",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20LCRW01T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600T",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1980",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC502",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC700",
                                       },
                                       {
                                          version_value: "V100R001C20SPH702",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-19415",
      datePublished: "2020-07-08T16:58:31",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-05T02:16:47.092Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1828 (GCVE-0-2020-1828)
Vulnerability from cvelistv5
Published
2020-02-17 19:49
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.955Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Input Validation",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T19:49:51",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1828",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Input Validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1828",
      datePublished: "2020-02-17T19:49:51",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.955Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1829 (GCVE-0-2020-1829)
Vulnerability from cvelistv5
Published
2020-02-17 20:16
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:31.029Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Double Free Memory",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T20:16:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1829",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Double Free Memory",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1829",
      datePublished: "2020-02-17T20:16:01",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:31.029Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9201 (GCVE-0-2020-9201)
Vulnerability from cvelistv5
Published
2020-12-24 15:44
Modified
2024-08-04 10:19
Severity ?
Summary
There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60SPC500,V500R005C00
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:20.072Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60SPC500,V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out of Bounds Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-12-24T15:44:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9201",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out of Bounds Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9201",
      datePublished: "2020-12-24T15:44:52",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:20.072Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1881 (GCVE-0-2020-1881)
Vulnerability from cvelistv5
Published
2020-02-28 18:33
Modified
2024-08-04 06:53
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
Impacted products
Vendor Product Version
n/a NIP6800;Secospace USG6600;USG9500 Version: V500R001C30
Version: V500R001C30SPC200,V500R001C30SPC600
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.870Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Resource Management Error",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-30T04:06:13",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1881",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Resource Management Error",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1881",
      datePublished: "2020-02-28T18:33:30",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.870Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-37129 (GCVE-0-2021-37129)
Vulnerability from cvelistv5
Published
2021-10-27 00:41
Modified
2024-08-04 01:16
Severity ?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
Impacted products
Vendor Product Version
n/a IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500 Version: V500R005C00,V500R005C20
Version: V500R005C00
Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10
Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600
Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500
Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:16:03.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00,V500R005C20",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out of Bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-27T00:41:44",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-37129",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600",
                                       },
                                       {
                                          version_value: "V500R005C00,V500R005C20",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out of Bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-37129",
      datePublished: "2021-10-27T00:41:44",
      dateReserved: "2021-07-20T00:00:00",
      dateUpdated: "2024-08-04T01:16:03.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17254 (GCVE-0-2017-17254)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.892Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17254",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17254",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.892Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15337 (GCVE-0-2017-15337)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.527Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15337",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15337",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.527Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1871 (GCVE-0-2020-1871)
Vulnerability from cvelistv5
Published
2020-01-03 14:25
Modified
2024-08-04 06:53
Severity ?
Summary
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
Impacted products
Vendor Product Version
n/a USG9500 Version: V500R001C30SPC100
Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Version: V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.977Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Credentials Management",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-03T14:25:18",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1871",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC100",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                       {
                                          version_value: "V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Improper Credentials Management",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1871",
      datePublished: "2020-01-03T14:25:18",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.977Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1815 (GCVE-0-2020-1815)
Vulnerability from cvelistv5
Published
2020-02-17 23:18
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei Secospace USG6600, USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.981Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Memory Leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T23:18:39",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1815",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Memory Leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1815",
      datePublished: "2020-02-17T23:18:39",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.981Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17255 (GCVE-0-2017-17255)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:44:00.156Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "null pointer dereference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17255",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "null pointer dereference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17255",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:44:00.156Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-5273 (GCVE-0-2019-5273)
Vulnerability from cvelistv5
Published
2019-12-26 18:49
Modified
2024-08-04 19:47
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.
Impacted products
Vendor Product Version
Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:47:56.749Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-26T18:49:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5273",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5273",
      datePublished: "2019-12-26T18:49:52",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:47:56.749Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-19411 (GCVE-0-2019-19411)
Vulnerability from cvelistv5
Published
2020-01-21 18:09
Modified
2024-08-05 02:16
Severity ?
Summary
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
Impacted products
Vendor Product Version
n/a USG9500 Version: V500R001C30SPC100,V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:16:47.114Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC100,V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-21T18:09:27",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-19411",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC100,V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-19411",
      datePublished: "2020-01-21T18:09:27",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-05T02:16:47.114Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17153 (GCVE-0-2017-17153)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.924Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17153",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17153",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.924Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17257 (GCVE-0-2017-17257)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:44:00.415Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17257",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17257",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:44:00.415Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17155 (GCVE-0-2017-17155)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.879Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds memory access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17155",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds memory access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17155",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.879Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15336 (GCVE-0-2017-15336)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.684Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15336",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15336",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.684Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1814 (GCVE-0-2020-1814)
Vulnerability from cvelistv5
Published
2020-02-18 01:53
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
   Huawei Secospace USG6600, USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.897Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
            {
               product: "Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Dangling Pointer Reference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-18T01:53:40",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1814",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Dangling Pointer Reference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1814",
      datePublished: "2020-02-18T01:53:40",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.897Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22360 (GCVE-0-2021-22360)
Vulnerability from cvelistv5
Published
2021-05-27 12:50
Modified
2024-08-03 18:44
Severity ?
Summary
There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
Impacted products
Vendor Product Version
n/a USG9500 Version: V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:44:12.321Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Resource Management Error",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-27T12:50:24",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22360",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Resource Management Error",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22360",
      datePublished: "2021-05-27T12:50:24",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:44:12.321Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15332 (GCVE-0-2017-15332)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.527Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-11-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15332",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15332",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.527Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15334 (GCVE-0-2017-15334)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.504Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15334",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15334",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.504Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22312 (GCVE-0-2021-22312)
Vulnerability from cvelistv5
Published
2021-04-08 18:18
Modified
2024-08-03 18:37
Severity ?
Summary
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
n/a IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R005C00SPC100,V500R005C00SPC200
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.509Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00SPC100,V500R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Memory Leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-04-08T18:18:36",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22312",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Memory Leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22312",
      datePublished: "2021-04-08T18:18:36",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.509Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9099 (GCVE-0-2020-9099)
Vulnerability from cvelistv5
Published
2020-06-08 13:55
Modified
2024-08-04 10:19
Severity ?
Summary
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.
Impacted products
Vendor Product Version
n/a IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Version: V500R001C60
Version: V500R001C80
Version: V500R005C00
Version: V500R005C10
Version: V500R005C20
Version: V500R002C00
Version: V500R002C10
Version: V500R002C20
Version: V500R002C30
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:20.044Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R001C80",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
                  {
                     status: "affected",
                     version: "V500R005C20",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C10",
                  },
                  {
                     status: "affected",
                     version: "V500R002C20",
                  },
                  {
                     status: "affected",
                     version: "V500R002C30",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Authentication",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-08T13:55:12",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9099",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C80",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                       {
                                          version_value: "V500R005C20",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C10",
                                       },
                                       {
                                          version_value: "V500R002C20",
                                       },
                                       {
                                          version_value: "V500R002C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Improper Authentication",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9099",
      datePublished: "2020-06-08T13:55:12",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:20.044Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17157 (GCVE-0-2017-17157)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.756Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds memory access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17157",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds memory access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17157",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.756Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2014-9136 (GCVE-0-2014-9136)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:33
Severity ?
Summary
Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
Impacted products
Vendor Product Version
n/a FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions, Version: FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T13:33:13.586Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,",
                  },
               ],
            },
         ],
         datePublic: "2017-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CSRF",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-02T19:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2014-9136",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CSRF",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2014-9136",
      datePublished: "2017-04-02T20:00:00",
      dateReserved: "2014-11-28T00:00:00",
      dateUpdated: "2024-08-06T13:33:13.586Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17256 (GCVE-0-2017-17256)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.866Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17256",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17256",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.866Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9212 (GCVE-0-2020-9212)
Vulnerability from cvelistv5
Published
2021-03-22 17:31
Modified
2024-08-04 10:19
Severity ?
Summary
There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.
Impacted products
Vendor Product Version
n/a USG9500 Version: V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:20.111Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Information Processing",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T17:31:13",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9212",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Improper Information Processing",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9212",
      datePublished: "2021-03-22T17:31:13",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:20.111Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-5272 (GCVE-0-2019-5272)
Vulnerability from cvelistv5
Published
2019-12-26 18:30
Modified
2024-08-04 19:47
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.
Impacted products
Vendor Product Version
Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:47:56.817Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Integrity Checking",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-26T18:30:49",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5272",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Integrity Checking",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5272",
      datePublished: "2019-12-26T18:30:49",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:47:56.817Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17156 (GCVE-0-2017-17156)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.805Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds memory access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17156",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds memory access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17156",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.805Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17253 (GCVE-0-2017-17253)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:44:00.120Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17253",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17253",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:44:00.120Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-5275 (GCVE-0-2019-5275)
Vulnerability from cvelistv5
Published
2019-12-26 18:36
Modified
2024-08-04 19:54
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.
Impacted products
Vendor Product Version
Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:54:51.843Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-26T18:36:19",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5275",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5275",
      datePublished: "2019-12-26T18:36:19",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:54:51.843Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17252 (GCVE-0-2017-17252)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.871Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17252",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17252",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.871Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22321 (GCVE-0-2021-22321)
Vulnerability from cvelistv5
Published
2021-03-22 19:03
Modified
2024-08-03 18:37
Severity ?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
Impacted products
Vendor Product Version
n/a NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R001C30,V500R001C60
Version: V500R001C30
Version: V500R001C60
Version: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10
Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.499Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30,V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Use After Free",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T19:03:52",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22321",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100",
                                       },
                                       {
                                          version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                       {
                                          version_value: "V500R001C30,V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Use After Free",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22321",
      datePublished: "2021-03-22T19:03:52",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.499Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17152 (GCVE-0-2017-17152)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:44
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:44:00.391Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17152",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17152",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:44:00.391Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-9101 (GCVE-0-2020-9101)
Vulnerability from cvelistv5
Published
2020-07-17 23:05
Modified
2024-08-04 10:19
Severity ?
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
Impacted products
Vendor Product Version
Huawei IPS Module Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei NGFW Module Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6300 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6500 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Version: V500R005C10
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:19:19.829Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
            {
               product: "NGFW Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
            {
               product: "Secospace USG6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
            {
               product: "Secospace USG6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
                  {
                     status: "affected",
                     version: "V500R005C10",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-17T23:05:27",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-9101",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NGFW Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C10",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-9101",
      datePublished: "2020-07-17T23:05:27",
      dateReserved: "2020-02-18T00:00:00",
      dateUpdated: "2024-08-04T10:19:19.829Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17154 (GCVE-0-2017-17154)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.883Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17154",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17154",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.883Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-4576 (GCVE-0-2016-4576)
Vulnerability from cvelistv5
Published
2016-05-23 19:00
Modified
2024-08-06 00:32
Severity ?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:32:26.013Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "90530",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/90530",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-05-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "90530",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/90530",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-4576",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "90530",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/90530",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-4576",
      datePublished: "2016-05-23T19:00:00",
      dateReserved: "2016-05-11T00:00:00",
      dateUpdated: "2024-08-06T00:32:26.013Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-5274 (GCVE-0-2019-5274)
Vulnerability from cvelistv5
Published
2019-12-26 18:42
Modified
2024-08-04 19:47
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.
Impacted products
Vendor Product Version
Huawei USG9500 Version: V500R001C30
Version: V500R001C60
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:47:57.020Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "denial of service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-26T18:42:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-5274",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "denial of service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-5274",
      datePublished: "2019-12-26T18:42:01",
      dateReserved: "2019-01-04T00:00:00",
      dateUpdated: "2024-08-04T19:47:57.020Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-19416 (GCVE-0-2019-19416)
Vulnerability from cvelistv5
Published
2020-07-08 16:55
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:16:47.115Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR160",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16PWE",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C11",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
               ],
            },
            {
               product: "AR510",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C15",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16",
                  },
                  {
                     status: "affected",
                     version: "V200R006C17",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC180T",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "DP300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "IPS Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NGFW Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C10",
                  },
               ],
            },
            {
               product: "NIP6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NetEngine16EX",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "RSE6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "SMC2.0",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R003C00SPC200T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC301T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C10",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC101B001T",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC102",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC103",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC201T",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "SRG1300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG2300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG3300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SVN5600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800-C",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SeMG9811",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC700",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPCa00",
                  },
               ],
            },
            {
               product: "Secospace USG6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C00",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "SoftCo",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C01SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
               ],
            },
            {
               product: "TE30",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C02SPC200 V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE40",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE50",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE60",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC800",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00SPC200",
                  },
               ],
            },
            {
               product: "TP3206",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R002C00",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01",
                  },
                  {
                     status: "affected",
                     version: "V300R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "USG9520",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC800PWE",
                  },
               ],
            },
            {
               product: "USG9560",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C20SPC300",
                  },
               ],
            },
            {
               product: "VP9660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100B015T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101TB015",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC102T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC103T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC104T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200B022T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC201B023T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC202B025T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC203T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC206T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC207T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC208T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC209T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400B001",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC401T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC402T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC403T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC404T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC405T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC701T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC702T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC703T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa02T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCc00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd",
                  },
               ],
            },
            {
               product: "ViewPoint 8660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R008C03B013SP02",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP04",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC900",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCc00",
                  },
               ],
            },
            {
               product: "ViewPoint 9030",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R011C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP15",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP16",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B015SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100B012",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC500",
                  },
               ],
            },
            {
               product: "eSpace U1910",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1911",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1930",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1960",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20LCRW01T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1980",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC502",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1981",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH702",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-08T16:55:48",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-19416",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10SPC300",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR160",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR2200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C16PWE",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR2200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C11",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C10",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR510",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C15",
                                       },
                                       {
                                          version_value: "V200R006C16",
                                       },
                                       {
                                          version_value: "V200R006C17",
                                       },
                                       {
                                          version_value: "V200R007C00SPC180T",
                                       },
                                       {
                                          version_value: "V200R007C00SPC600",
                                       },
                                       {
                                          version_value: "V200R007C00SPC900",
                                       },
                                       {
                                          version_value: "V200R007C00SPCb00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "DP300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "IPS Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NGFW Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NetEngine16EX",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "RSE6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SMC2.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R003C00SPC200T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC300T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC301T",
                                       },
                                       {
                                          version_value: "V100R003C10",
                                       },
                                       {
                                          version_value: "V100R005C00SPC100",
                                       },
                                       {
                                          version_value: "V100R005C00SPC101B001T",
                                       },
                                       {
                                          version_value: "V100R005C00SPC102",
                                       },
                                       {
                                          version_value: "V100R005C00SPC103",
                                       },
                                       {
                                          version_value: "V100R005C00SPC200",
                                       },
                                       {
                                          version_value: "V100R005C00SPC201T",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG1300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG2300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG3300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800-C",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SeMG9811",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC500",
                                       },
                                       {
                                          version_value: "V300R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V300R001C01SPC700",
                                       },
                                       {
                                          version_value: "V300R001C01SPCa00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Secospace USG6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C00",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SoftCo",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C01SPC300",
                                       },
                                       {
                                          version_value: "V200R001C01SPC400",
                                       },
                                       {
                                          version_value: "V200R001C01SPC500",
                                       },
                                       {
                                          version_value: "V200R001C01SPC600",
                                       },
                                       {
                                          version_value: "V200R001C01SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00SPC100",
                                       },
                                       {
                                          version_value: "V200R003C00SPC200",
                                       },
                                       {
                                          version_value: "V200R003C00SPC300",
                                       },
                                       {
                                          version_value: "V200R003C00SPC500",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE30",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C02SPC100",
                                       },
                                       {
                                          version_value: "V100R001C02SPC200 V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE40",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE50",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "TE60",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC100",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C10SPC300",
                                       },
                                       {
                                          version_value: "V100R001C10SPC400",
                                       },
                                       {
                                          version_value: "V100R001C10SPC500",
                                       },
                                       {
                                          version_value: "V100R001C10SPC600",
                                       },
                                       {
                                          version_value: "V100R001C10SPC800",
                                       },
                                       {
                                          version_value: "V100R003C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C00SPC100",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC300",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC800",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCa00",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "V600R006C00SPC200",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TP3206",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01",
                                       },
                                       {
                                          version_value: "V300R001C20",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9520",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC800PWE",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9560",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C20SPC300",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "VP9660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C02SPC100",
                                       },
                                       {
                                          version_value: "V200R001C02SPC200",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300T",
                                       },
                                       {
                                          version_value: "V200R001C02SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100B015T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101TB015",
                                       },
                                       {
                                          version_value: "V200R001C30SPC102T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC103T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC104T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200B022T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC201B023T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC202B025T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC203T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC206T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC207T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC208T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC209T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC300",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400B001",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC401T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC402T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC403T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC404T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC405T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC600",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC701T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC702T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC703T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC900",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa02T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCb00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCc00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "ViewPoint 8660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R008C03B013SP02",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP03",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP04",
                                       },
                                       {
                                          version_value: "V100R008C03SPC100",
                                       },
                                       {
                                          version_value: "V100R008C03SPC200",
                                       },
                                       {
                                          version_value: "V100R008C03SPC300",
                                       },
                                       {
                                          version_value: "V100R008C03SPC400",
                                       },
                                       {
                                          version_value: "V100R008C03SPC500",
                                       },
                                       {
                                          version_value: "V100R008C03SPC600",
                                       },
                                       {
                                          version_value: "V100R008C03SPC700",
                                       },
                                       {
                                          version_value: "V100R008C03SPC800",
                                       },
                                       {
                                          version_value: "V100R008C03SPC900",
                                       },
                                       {
                                          version_value: "V100R008C03SPCa00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCb00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCc00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R011C02SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP15",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP16",
                                       },
                                       {
                                          version_value: "V100R011C03B015SP03",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100B012",
                                       },
                                       {
                                          version_value: "V100R011C03SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03SPC200",
                                       },
                                       {
                                          version_value: "V100R011C03SPC300",
                                       },
                                       {
                                          version_value: "V100R011C03SPC400",
                                       },
                                       {
                                          version_value: "V100R011C03SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1910",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1911",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1930",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "eSpace U1960",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20LCRW01T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600T",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1980",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC502",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC700",
                                       },
                                       {
                                          version_value: "V100R001C20SPH702",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-19416",
      datePublished: "2020-07-08T16:55:48",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-05T02:16:47.115Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17258 (GCVE-0-2017-17258)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.977Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "resource management",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-04-24T14:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17258",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "resource management",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17258",
      datePublished: "2018-04-24T15:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.977Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1883 (GCVE-0-2020-1883)
Vulnerability from cvelistv5
Published
2020-06-05 14:19
Modified
2024-08-04 06:53
Severity ?
Summary
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.
Impacted products
Vendor Product Version
n/a NIP6800 Version: V500R001C60SPC500
   n/a Secospace USG6600 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
   n/a USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:59.493Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Memory Leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-06-05T14:19:43",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1883",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Memory Leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1883",
      datePublished: "2020-06-05T14:19:43",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:59.493Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22356 (GCVE-0-2021-22356)
Vulnerability from cvelistv5
Published
2021-11-23 15:05
Modified
2024-08-03 18:37
Severity ?
Summary
There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.
Impacted products
Vendor Product Version
n/a IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R005C00SPC100,V500R005C00SPC200
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.543Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00SPC100,V500R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Weak Secure Algorithm",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-23T15:05:21",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22356",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Weak Secure Algorithm",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22356",
      datePublished: "2021-11-23T15:05:21",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.543Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15338 (GCVE-0-2017-15338)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.494Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15338",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15338",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.494Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15339 (GCVE-0-2017-15339)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.565Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15339",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15339",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.565Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-15331 (GCVE-0-2017-15331)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T19:50:16.586Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-11-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "out-of-bounds read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-15331",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "out-of-bounds read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-15331",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-10-14T00:00:00",
      dateUpdated: "2024-08-05T19:50:16.586Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2016-4577 (GCVE-0-2016-4577)
Vulnerability from cvelistv5
Published
2016-05-23 19:00
Modified
2024-08-06 00:32
Severity ?
Summary
Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T00:32:25.907Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
               },
               {
                  name: "90532",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/90532",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-05-11T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T19:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
            },
            {
               name: "90532",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/90532",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-4577",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en",
                  },
                  {
                     name: "90532",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/90532",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-4577",
      datePublished: "2016-05-23T19:00:00",
      dateReserved: "2016-05-11T00:00:00",
      dateUpdated: "2024-08-06T00:32:25.907Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1858 (GCVE-0-2020-1858)
Vulnerability from cvelistv5
Published
2020-02-17 19:30
Modified
2024-08-04 06:53
Severity ?
Summary
Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-19T05:06:04",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1858",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1858",
      datePublished: "2020-02-17T19:30:02",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.976Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17295 (GCVE-0-2017-17295)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:51:30.562Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2017-12-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "buffer overflow",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17295",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "buffer overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17295",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:51:30.562Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17138 (GCVE-0-2017-17138)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 03:44
Severity ?
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.830Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17138",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17138",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T03:44:03.746Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1827 (GCVE-0-2020-1827)
Vulnerability from cvelistv5
Published
2020-02-17 20:38
Modified
2024-08-04 06:46
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
   Huawei Secospace USG6600, USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:46:30.916Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
            {
               product: "Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T20:38:59",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1827",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1827",
      datePublished: "2020-02-17T20:38:59",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:46:30.916Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2019-19417 (GCVE-0-2019-19417)
Vulnerability from cvelistv5
Published
2020-07-08 16:53
Modified
2024-08-05 02:16
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
Impacted products
Vendor Product Version
Huawei AR120-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20 V200R008C30
Create a notification for this product.
   Huawei AR1200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR150-S Version: V200R006C10SPC300
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR160 Version: V200R006C10
Version: V200R006C12
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200 Version: V200R006C10
Version: V200R006C13
Version: V200R006C16PWE
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR2200-S Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3200 Version: V200R006C10
Version: V200R006C11
Version: V200R007C00
Version: V200R007C01
Version: V200R007C02
Version: V200R008C00
Version: V200R008C10
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei AR3600 Version: V200R006C10
Version: V200R007C00
Version: V200R007C01
Version: V200R008C20
Create a notification for this product.
   Huawei AR510 Version: V200R006C10
Version: V200R006C12
Version: V200R006C13
Version: V200R006C15
Version: V200R006C16
Version: V200R006C17
Version: V200R007C00SPC180T
Version: V200R007C00SPC600
Version: V200R007C00SPC900
Version: V200R007C00SPCb00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei DP300 Version: V500R002C00
Create a notification for this product.
   Huawei IPS Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NGFW Module Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R002C00
Version: V500R002C10
Create a notification for this product.
   Huawei NIP6300 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6600 Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NIP6800 Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei NetEngine16EX Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei RSE6500 Version: V500R002C00
Create a notification for this product.
   Huawei SMC2.0 Version: V100R003C00SPC200T
Version: V100R003C00SPC300T
Version: V100R003C00SPC301T
Version: V100R003C10
Version: V100R005C00SPC100
Version: V100R005C00SPC101B001T
Version: V100R005C00SPC102
Version: V100R005C00SPC103
Version: V100R005C00SPC200
Version: V100R005C00SPC201T
Version: V500R002C00
Version: V600R006C00
Create a notification for this product.
   Huawei SRG1300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG2300 Version: V200R006C10
Version: V200R007C00
Version: V200R007C02
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SRG3300 Version: V200R006C10
Version: V200R007C00
Version: V200R008C20
Version: V200R008C30
Create a notification for this product.
   Huawei SVN5600 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800 Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SVN5800-C Version: V200R003C00
Version: V200R003C10
Create a notification for this product.
   Huawei SeMG9811 Version: V300R001C01SPC500
Version: V300R001C01SPC500T
Version: V300R001C01SPC700
Version: V300R001C01SPCa00
Create a notification for this product.
   Huawei Secospace USG6300 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6500 Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei Secospace USG6600 Version: V100R001C00
Version: V100R001C10
Version: V100R001C20
Version: V100R001C30
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei SoftCo Version: V200R001C01SPC300
Version: V200R001C01SPC400
Version: V200R001C01SPC500
Version: V200R001C01SPC600
Version: V200R001C01SPH703
Version: V200R003C00SPC100
Version: V200R003C00SPC200
Version: V200R003C00SPC300
Version: V200R003C00SPC500
Version: V200R003C20
Create a notification for this product.
   Huawei TE30 Version: V100R001C02SPC100
Version: V100R001C02SPC200 V100R001C10
Version: V500R002C00SPC200
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE40 Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC900
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE50 Version: V500R002C00SPC600
Version: V500R002C00SPCb00
Version: V600R006C00
Create a notification for this product.
   Huawei TE60 Version: V100R001C01SPC100
Version: V100R001C10
Version: V100R001C10SPC300
Version: V100R001C10SPC400
Version: V100R001C10SPC500
Version: V100R001C10SPC600
Version: V100R001C10SPC800
Version: V100R003C00
Version: V500R002C00
Version: V500R002C00SPC100
Version: V500R002C00SPC200
Version: V500R002C00SPC300
Version: V500R002C00SPC600
Version: V500R002C00SPC700
Version: V500R002C00SPC800
Version: V500R002C00SPC900
Version: V500R002C00SPCa00
Version: V500R002C00SPCb00
Version: V600R006C00
Version: V600R006C00SPC200
Create a notification for this product.
   Huawei TP3206 Version: V100R002C00
Create a notification for this product.
   Huawei USG9500 Version: V300R001C01
Version: V300R001C20
Version: V500R001C00
Version: V500R001C20
Version: V500R001C30
Version: V500R001C50
Create a notification for this product.
   Huawei USG9520 Version: V300R001C01SPC800PWE
Create a notification for this product.
   Huawei USG9560 Version: V300R001C20SPC300
Create a notification for this product.
   Huawei VP9660 Version: V200R001C02SPC100
Version: V200R001C02SPC200
Version: V200R001C02SPC300
Version: V200R001C02SPC300T
Version: V200R001C02SPC400
Version: V200R001C30SPC100
Version: V200R001C30SPC100B015T
Version: V200R001C30SPC101
Version: V200R001C30SPC101TB015
Version: V200R001C30SPC102T
Version: V200R001C30SPC103T
Version: V200R001C30SPC104T
Version: V200R001C30SPC200
Version: V200R001C30SPC200B022T
Version: V200R001C30SPC201B023T
Version: V200R001C30SPC202B025T
Version: V200R001C30SPC203T
Version: V200R001C30SPC206T
Version: V200R001C30SPC207T
Version: V200R001C30SPC208T
Version: V200R001C30SPC209T
Version: V200R001C30SPC300
Version: V200R001C30SPC400
Version: V200R001C30SPC400B001
Version: V200R001C30SPC400T
Version: V200R001C30SPC401T
Version: V200R001C30SPC402T
Version: V200R001C30SPC403T
Version: V200R001C30SPC404T
Version: V200R001C30SPC405T
Version: V200R001C30SPC600
Version: V200R001C30SPC700
Version: V200R001C30SPC700T
Version: V200R001C30SPC701T
Version: V200R001C30SPC702T
Version: V200R001C30SPC703T
Version: V200R001C30SPC800
Version: V200R001C30SPC800T
Version: V200R001C30SPC900
Version: V200R001C30SPCa00
Version: V200R001C30SPCa00T
Version: V200R001C30SPCa01
Version: V200R001C30SPCa01T
Version: V200R001C30SPCa02T
Version: V200R001C30SPCb00
Version: V200R001C30SPCc00
Version: V200R001C30SPCd00
Version: V200R001C30SPCd00T
Version: V200R001C30SPCd01T
Version: V200R001C30SPCd
Create a notification for this product.
   Huawei ViewPoint 8660 Version: V100R008C03B013SP02
Version: V100R008C03B013SP03
Version: V100R008C03B013SP04
Version: V100R008C03SPC100
Version: V100R008C03SPC200
Version: V100R008C03SPC300
Version: V100R008C03SPC400
Version: V100R008C03SPC500
Version: V100R008C03SPC600
Version: V100R008C03SPC700
Version: V100R008C03SPC800
Version: V100R008C03SPC900
Version: V100R008C03SPCa00
Version: V100R008C03SPCb00
Version: V100R008C03SPCc00
Create a notification for this product.
   Huawei ViewPoint 9030 Version: V100R011C02SPC100
Version: V100R011C03B012SP15
Version: V100R011C03B012SP16
Version: V100R011C03B015SP03
Version: V100R011C03LGWL01SPC100
Version: V100R011C03LGWL01SPC100B012
Version: V100R011C03SPC100
Version: V100R011C03SPC200
Version: V100R011C03SPC300
Version: V100R011C03SPC400
Version: V100R011C03SPC500
Create a notification for this product.
   Huawei eSpace U1910 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1911 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1930 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1960 Version: V100R001C01SPC500
Version: V100R001C20LCRW01T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC600
Version: V100R001C20SPC600T
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1980 Version: V100R001C01SPC500T
Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500T
Version: V100R001C20SPC502
Version: V100R001C20SPC600
Version: V100R001C20SPH309
Version: V100R001C20SPH703
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
   Huawei eSpace U1981 Version: V100R001C20SPC300
Version: V100R001C20SPC400
Version: V100R001C20SPC500
Version: V100R001C20SPC600
Version: V100R001C20SPC700
Version: V100R001C20SPH702
Version: V100R001C20SPH703
Version: V100R001C30
Version: V200R003C00
Version: V200R003C20
Version: V200R003C30
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:16:47.230Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AR120-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20 V200R008C30",
                  },
               ],
            },
            {
               product: "AR1200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR150-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR160",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16PWE",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR2200-S",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3200",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C11",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C10",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "AR3600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
               ],
            },
            {
               product: "AR510",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R006C12",
                  },
                  {
                     status: "affected",
                     version: "V200R006C13",
                  },
                  {
                     status: "affected",
                     version: "V200R006C15",
                  },
                  {
                     status: "affected",
                     version: "V200R006C16",
                  },
                  {
                     status: "affected",
                     version: "V200R006C17",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC180T",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "DP300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "IPS Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NGFW Module",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C10",
                  },
               ],
            },
            {
               product: "NIP6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "NetEngine16EX",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "RSE6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
               ],
            },
            {
               product: "SMC2.0",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R003C00SPC200T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00SPC301T",
                  },
                  {
                     status: "affected",
                     version: "V100R003C10",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC101B001T",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC102",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC103",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R005C00SPC201T",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "SRG1300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG2300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C02",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SRG3300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R008C20",
                  },
                  {
                     status: "affected",
                     version: "V200R008C30",
                  },
               ],
            },
            {
               product: "SVN5600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SVN5800-C",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C10",
                  },
               ],
            },
            {
               product: "SeMG9811",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPC700",
                  },
                  {
                     status: "affected",
                     version: "V300R001C01SPCa00",
                  },
               ],
            },
            {
               product: "Secospace USG6300",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C00",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "SoftCo",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C01SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C01SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00SPC500",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
               ],
            },
            {
               product: "TE30",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C02SPC200 V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE40",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE50",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
               ],
            },
            {
               product: "TE60",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R003C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC100",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC300",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC700",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC800",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPC900",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00SPC200",
                  },
               ],
            },
            {
               product: "TP3206",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R002C00",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01",
                  },
                  {
                     status: "affected",
                     version: "V300R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C20",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C50",
                  },
               ],
            },
            {
               product: "USG9520",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C01SPC800PWE",
                  },
               ],
            },
            {
               product: "USG9560",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V300R001C20SPC300",
                  },
               ],
            },
            {
               product: "VP9660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V200R001C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC300T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C02SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC100B015T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC101TB015",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC102T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC103T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC104T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC200B022T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC201B023T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC202B025T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC203T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC206T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC207T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC208T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC209T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC300",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400B001",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC400T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC401T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC402T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC403T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC404T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC405T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC700T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC701T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC702T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC703T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC800T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPC900",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCa02T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCc00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd00T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd01T",
                  },
                  {
                     status: "affected",
                     version: "V200R001C30SPCd",
                  },
               ],
            },
            {
               product: "ViewPoint 8660",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R008C03B013SP02",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03B013SP04",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC800",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPC900",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCa00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCb00",
                  },
                  {
                     status: "affected",
                     version: "V100R008C03SPCc00",
                  },
               ],
            },
            {
               product: "ViewPoint 9030",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R011C02SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP15",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B012SP16",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03B015SP03",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03LGWL01SPC100B012",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC100",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC200",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03SPC500",
                  },
               ],
            },
            {
               product: "eSpace U1910",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1911",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1930",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1960",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20LCRW01T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1980",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C01SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500T",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC502",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH309",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
            {
               product: "eSpace U1981",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V100R001C20SPC300",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC400",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC500",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC600",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPC700",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH702",
                  },
                  {
                     status: "affected",
                     version: "V100R001C20SPH703",
                  },
                  {
                     status: "affected",
                     version: "V100R001C30",
                  },
                  {
                     status: "affected",
                     version: "V200R003C00",
                  },
                  {
                     status: "affected",
                     version: "V200R003C20",
                  },
                  {
                     status: "affected",
                     version: "V200R003C30",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-08T16:53:05",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2019-19417",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR120-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20 V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR1200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR150-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10SPC300",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR160",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR2200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C16PWE",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AR2200-S",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3200",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C11",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R008C10",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR3600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "AR510",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R006C12",
                                       },
                                       {
                                          version_value: "V200R006C13",
                                       },
                                       {
                                          version_value: "V200R006C15",
                                       },
                                       {
                                          version_value: "V200R006C16",
                                       },
                                       {
                                          version_value: "V200R006C17",
                                       },
                                       {
                                          version_value: "V200R007C00SPC180T",
                                       },
                                       {
                                          version_value: "V200R007C00SPC600",
                                       },
                                       {
                                          version_value: "V200R007C00SPC900",
                                       },
                                       {
                                          version_value: "V200R007C00SPCb00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "DP300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "IPS Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NGFW Module",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NetEngine16EX",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "RSE6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SMC2.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R003C00SPC200T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC300T",
                                       },
                                       {
                                          version_value: "V100R003C00SPC301T",
                                       },
                                       {
                                          version_value: "V100R003C10",
                                       },
                                       {
                                          version_value: "V100R005C00SPC100",
                                       },
                                       {
                                          version_value: "V100R005C00SPC101B001T",
                                       },
                                       {
                                          version_value: "V100R005C00SPC102",
                                       },
                                       {
                                          version_value: "V100R005C00SPC103",
                                       },
                                       {
                                          version_value: "V100R005C00SPC200",
                                       },
                                       {
                                          version_value: "V100R005C00SPC201T",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG1300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG2300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C02",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SRG3300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C20",
                                       },
                                       {
                                          version_value: "V200R008C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SVN5800-C",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SeMG9811",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC500",
                                       },
                                       {
                                          version_value: "V300R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V300R001C01SPC700",
                                       },
                                       {
                                          version_value: "V300R001C01SPCa00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6300",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Secospace USG6500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C00",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C20",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SoftCo",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C01SPC300",
                                       },
                                       {
                                          version_value: "V200R001C01SPC400",
                                       },
                                       {
                                          version_value: "V200R001C01SPC500",
                                       },
                                       {
                                          version_value: "V200R001C01SPC600",
                                       },
                                       {
                                          version_value: "V200R001C01SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00SPC100",
                                       },
                                       {
                                          version_value: "V200R003C00SPC200",
                                       },
                                       {
                                          version_value: "V200R003C00SPC300",
                                       },
                                       {
                                          version_value: "V200R003C00SPC500",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE30",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C02SPC100",
                                       },
                                       {
                                          version_value: "V100R001C02SPC200 V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE40",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TE50",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "TE60",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC100",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V100R001C10SPC300",
                                       },
                                       {
                                          version_value: "V100R001C10SPC400",
                                       },
                                       {
                                          version_value: "V100R001C10SPC500",
                                       },
                                       {
                                          version_value: "V100R001C10SPC600",
                                       },
                                       {
                                          version_value: "V100R001C10SPC800",
                                       },
                                       {
                                          version_value: "V100R003C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V500R002C00SPC100",
                                       },
                                       {
                                          version_value: "V500R002C00SPC200",
                                       },
                                       {
                                          version_value: "V500R002C00SPC300",
                                       },
                                       {
                                          version_value: "V500R002C00SPC600",
                                       },
                                       {
                                          version_value: "V500R002C00SPC700",
                                       },
                                       {
                                          version_value: "V500R002C00SPC800",
                                       },
                                       {
                                          version_value: "V500R002C00SPC900",
                                       },
                                       {
                                          version_value: "V500R002C00SPCa00",
                                       },
                                       {
                                          version_value: "V500R002C00SPCb00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "V600R006C00SPC200",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "TP3206",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R002C00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01",
                                       },
                                       {
                                          version_value: "V300R001C20",
                                       },
                                       {
                                          version_value: "V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C20",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C50",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9520",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C01SPC800PWE",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9560",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V300R001C20SPC300",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "VP9660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V200R001C02SPC100",
                                       },
                                       {
                                          version_value: "V200R001C02SPC200",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300",
                                       },
                                       {
                                          version_value: "V200R001C02SPC300T",
                                       },
                                       {
                                          version_value: "V200R001C02SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100",
                                       },
                                       {
                                          version_value: "V200R001C30SPC100B015T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101",
                                       },
                                       {
                                          version_value: "V200R001C30SPC101TB015",
                                       },
                                       {
                                          version_value: "V200R001C30SPC102T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC103T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC104T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200",
                                       },
                                       {
                                          version_value: "V200R001C30SPC200B022T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC201B023T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC202B025T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC203T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC206T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC207T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC208T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC209T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC300",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400B001",
                                       },
                                       {
                                          version_value: "V200R001C30SPC400T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC401T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC402T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC403T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC404T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC405T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC600",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700",
                                       },
                                       {
                                          version_value: "V200R001C30SPC700T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC701T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC702T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC703T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800",
                                       },
                                       {
                                          version_value: "V200R001C30SPC800T",
                                       },
                                       {
                                          version_value: "V200R001C30SPC900",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCa02T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCb00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCc00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd00T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd01T",
                                       },
                                       {
                                          version_value: "V200R001C30SPCd",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "ViewPoint 8660",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R008C03B013SP02",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP03",
                                       },
                                       {
                                          version_value: "V100R008C03B013SP04",
                                       },
                                       {
                                          version_value: "V100R008C03SPC100",
                                       },
                                       {
                                          version_value: "V100R008C03SPC200",
                                       },
                                       {
                                          version_value: "V100R008C03SPC300",
                                       },
                                       {
                                          version_value: "V100R008C03SPC400",
                                       },
                                       {
                                          version_value: "V100R008C03SPC500",
                                       },
                                       {
                                          version_value: "V100R008C03SPC600",
                                       },
                                       {
                                          version_value: "V100R008C03SPC700",
                                       },
                                       {
                                          version_value: "V100R008C03SPC800",
                                       },
                                       {
                                          version_value: "V100R008C03SPC900",
                                       },
                                       {
                                          version_value: "V100R008C03SPCa00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCb00",
                                       },
                                       {
                                          version_value: "V100R008C03SPCc00",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R011C02SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP15",
                                       },
                                       {
                                          version_value: "V100R011C03B012SP16",
                                       },
                                       {
                                          version_value: "V100R011C03B015SP03",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03LGWL01SPC100B012",
                                       },
                                       {
                                          version_value: "V100R011C03SPC100",
                                       },
                                       {
                                          version_value: "V100R011C03SPC200",
                                       },
                                       {
                                          version_value: "V100R011C03SPC300",
                                       },
                                       {
                                          version_value: "V100R011C03SPC400",
                                       },
                                       {
                                          version_value: "V100R011C03SPC500",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1910",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1911",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1930",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "eSpace U1960",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20LCRW01T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600T",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1980",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C01SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500T",
                                       },
                                       {
                                          version_value: "V100R001C20SPC502",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPH309",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "eSpace U1981",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V100R001C20SPC300",
                                       },
                                       {
                                          version_value: "V100R001C20SPC400",
                                       },
                                       {
                                          version_value: "V100R001C20SPC500",
                                       },
                                       {
                                          version_value: "V100R001C20SPC600",
                                       },
                                       {
                                          version_value: "V100R001C20SPC700",
                                       },
                                       {
                                          version_value: "V100R001C20SPH702",
                                       },
                                       {
                                          version_value: "V100R001C20SPH703",
                                       },
                                       {
                                          version_value: "V100R001C30",
                                       },
                                       {
                                          version_value: "V200R003C00",
                                       },
                                       {
                                          version_value: "V200R003C20",
                                       },
                                       {
                                          version_value: "V200R003C30",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                     refsource: "CONFIRM",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2019-19417",
      datePublished: "2020-07-08T16:53:05",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-05T02:16:47.230Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1857 (GCVE-0-2020-1857)
Vulnerability from cvelistv5
Published
2020-02-17 20:01
Modified
2024-08-04 06:53
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.
Impacted products
Vendor Product Version
Huawei NIP6800 Version: V500R001C30
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
   Huawei Secospace USG6600 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
   Huawei USG9500 Version: V500R001C30SPC200
Version: V500R001C30SPC600
Version: V500R001C60SPC500
Version: V500R005C00SPC100
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.616Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NIP6800",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
            {
               product: "Secospace USG6600",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
            {
               product: "USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC600",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00SPC100",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T20:01:03",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1857",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NIP6800",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Secospace USG6600",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC600",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500",
                                       },
                                       {
                                          version_value: "V500R005C00SPC100",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1857",
      datePublished: "2020-02-17T20:01:03",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.616Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22411 (GCVE-0-2021-22411)
Vulnerability from cvelistv5
Published
2021-05-27 12:12
Modified
2024-08-03 18:44
Severity ?
Summary
There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.
Impacted products
Vendor Product Version
n/a NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 Version: V500R005C00SPC100,V500R005C00SPC200
Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Version: V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:44:13.310Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R005C00SPC100,V500R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-Bounds Write",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-27T12:12:55",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22411",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-Bounds Write",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22411",
      datePublished: "2021-05-27T12:12:55",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:44:13.310Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-22309 (GCVE-0-2021-22309)
Vulnerability from cvelistv5
Published
2021-03-22 17:42
Modified
2024-08-03 18:37
Severity ?
Summary
There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.
Impacted products
Vendor Product Version
n/a USG9500,USG9520,USG9560,USG9580 Version: V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200
Version: V500R005C00
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:37:18.480Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "USG9500,USG9520,USG9560,USG9580",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-03-22T17:42:50",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2021-22309",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "USG9500,USG9520,USG9560,USG9580",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
                     refsource: "MISC",
                     url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2021-22309",
      datePublished: "2021-03-22T17:42:50",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:37:18.480Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-1856 (GCVE-0-2020-1856)
Vulnerability from cvelistv5
Published
2020-02-17 20:27
Modified
2024-08-04 06:53
Severity ?
Summary
Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
Impacted products
Vendor Product Version
Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500 Version: V500R001C30
Version: V500R001C60
Version: V500R005C00
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T06:53:58.787Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500",
               vendor: "Huawei",
               versions: [
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "V500R001C60",
                  },
                  {
                     status: "affected",
                     version: "V500R005C00",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information leakage",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-17T20:27:50",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2020-1856",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "V500R001C60",
                                       },
                                       {
                                          version_value: "V500R005C00",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information leakage",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2020-1856",
      datePublished: "2020-02-17T20:27:50",
      dateReserved: "2019-11-29T00:00:00",
      dateUpdated: "2024-08-04T06:53:58.787Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17137 (GCVE-0-2017-17137)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:42
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 Version: DP300 V500R002C00
Version: IPS Module V500R001C00
Version: V500R001C30
Version: NGFW Module V500R001C00
Version: V500R002C00
Version: NIP6300 V500R001C00
Version: NIP6600 V500R001C00
Version: RP200 V500R002C00
Version: V600R006C00
Version: S12700 V200R007C00
Version: V200R007C01
Version: V200R008C00
Version: V200R009C00
Version: V200R010C00
Version: S1700 V200R006C10
Version: S2700 V200R006C10
Version: V200R007C00
Version: S5700 V200R006C00
Version: S6700 V200R008C00
Version: S7700 V200R007C00
Version: S9700 V200R007C00
Version: Secospace USG6300 V500R001C00
Version: Secospace USG6500 V500R001C00
Version: Secospace USG6600 V500R001C00
Version: V500R001C30S
Version: TE30 V100R001C02
Version: V100R001C10
Version: TE40 V500R002C00
Version: TE50 V500R002C00
Version: TE60 V100R001C01
Version: TP3106 V100R002C00
Version: TP3206 V100R002C00
Version: V100R002C10
Version: USG9500 V500R001C00
Version: ViewPoint 9030 V100R011C02
Version: V100R011C03
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.902Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "DP300 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "IPS Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30",
                  },
                  {
                     status: "affected",
                     version: "NGFW Module V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "NIP6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "RP200 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "V600R006C00",
                  },
                  {
                     status: "affected",
                     version: "S12700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "V200R007C01",
                  },
                  {
                     status: "affected",
                     version: "V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "V200R009C00",
                  },
                  {
                     status: "affected",
                     version: "V200R010C00",
                  },
                  {
                     status: "affected",
                     version: "S1700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "S2700 V200R006C10",
                  },
                  {
                     status: "affected",
                     version: "V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S5700 V200R006C00",
                  },
                  {
                     status: "affected",
                     version: "S6700 V200R008C00",
                  },
                  {
                     status: "affected",
                     version: "S7700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "S9700 V200R007C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6300 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "V500R001C30S",
                  },
                  {
                     status: "affected",
                     version: "TE30 V100R001C02",
                  },
                  {
                     status: "affected",
                     version: "V100R001C10",
                  },
                  {
                     status: "affected",
                     version: "TE40 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE50 V500R002C00",
                  },
                  {
                     status: "affected",
                     version: "TE60 V100R001C01",
                  },
                  {
                     status: "affected",
                     version: "TP3106 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "TP3206 V100R002C00",
                  },
                  {
                     status: "affected",
                     version: "V100R002C10",
                  },
                  {
                     status: "affected",
                     version: "USG9500 V500R001C00",
                  },
                  {
                     status: "affected",
                     version: "ViewPoint 9030 V100R011C02",
                  },
                  {
                     status: "affected",
                     version: "V100R011C03",
                  },
               ],
            },
         ],
         datePublic: "2017-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Out-of-Bounds memory access",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-03-05T18:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               DATE_PUBLIC: "2017-12-06T00:00:00",
               ID: "CVE-2017-17137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "DP300 V500R002C00",
                                       },
                                       {
                                          version_value: "IPS Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NGFW Module V500R001C00",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "NIP6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "NIP6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "RP200 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "S12700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S1700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S2700 V200R006C10",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S5700 V200R006C00",
                                       },
                                       {
                                          version_value: "V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S6700 V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S7700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "S9700 V200R007C00",
                                       },
                                       {
                                          version_value: "V200R007C01",
                                       },
                                       {
                                          version_value: "V200R008C00",
                                       },
                                       {
                                          version_value: "V200R009C00",
                                       },
                                       {
                                          version_value: "V200R010C00",
                                       },
                                       {
                                          version_value: "Secospace USG6300 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "Secospace USG6600 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30S",
                                       },
                                       {
                                          version_value: "TE30 V100R001C02",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE40 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE50 V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TE60 V100R001C01",
                                       },
                                       {
                                          version_value: "V100R001C10",
                                       },
                                       {
                                          version_value: "V500R002C00",
                                       },
                                       {
                                          version_value: "V600R006C00",
                                       },
                                       {
                                          version_value: "TP3106 V100R002C00",
                                       },
                                       {
                                          version_value: "TP3206 V100R002C00",
                                       },
                                       {
                                          version_value: "V100R002C10",
                                       },
                                       {
                                          version_value: "USG9500 V500R001C00",
                                       },
                                       {
                                          version_value: "V500R001C30",
                                       },
                                       {
                                          version_value: "ViewPoint 9030 V100R011C02",
                                       },
                                       {
                                          version_value: "V100R011C03",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Out-of-Bounds memory access",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17137",
      datePublished: "2018-03-05T19:00:00Z",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-09-17T00:42:09.045Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2017-17162 (GCVE-0-2017-17162)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
Summary
Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500 Version: Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T20:43:59.917Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300",
                  },
               ],
            },
         ],
         datePublic: "2017-12-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "memory leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-02-15T15:57:02",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2017-17162",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "memory leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2017-17162",
      datePublished: "2018-02-15T16:00:00",
      dateReserved: "2017-12-04T00:00:00",
      dateUpdated: "2024-08-05T20:43:59.917Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}