Vulnerabilites related to huawei - usg9500_firmware
Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.", }, { lang: "es", value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un desbordamiento de búfer de la pila cuando se decodifica un certificado, un atacante puede explotar la vulnerabilidad mediante un certificado malicioso para llevar a cabo un ataque de denegación de servicio en los productos afectados.", }, ], id: "CVE-2019-5275", lastModified: "2024-11-21T04:44:39.223", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-26T19:15:11.127", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30 | |
huawei | secospace_usg6600_firmware | v500r001c60 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.", }, { lang: "es", value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de omisión del control de acceso. Los atacantes que pueden acceder a la red interna pueden explotar esta vulnerabilidad con una implementación cuidadosa. Una explotación con éxito puede causar que el control de acceso sea omitido y los atacantes puedan acceder directamente a Internet.", }, ], id: "CVE-2020-1860", lastModified: "2024-11-21T05:11:29.970", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:11.437", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:40
Severity ?
Summary
There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.", }, { lang: "es", value: "Se presenta una vulnerabilidad de denegación de servicio en algunos productos Huawei. En escenarios específicos, debido al manejo inapropiado de los paquetes, un atacante puede diseñar muchos paquetes específicos. Una explotación con éxito puede causar que algunos servicios sean anormales. Los productos afectados incluyen algunas versiones de NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 y SG9500", }, ], id: "CVE-2020-9213", lastModified: "2024-11-21T05:40:10.703", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-22T18:15:14.370", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:20
Severity ?
Summary
Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | fusionmanager | * | |
huawei | fusionmanager | * | |
huawei | usg9500_firmware | * | |
huawei | usg9500_firmware | * | |
huawei | usg9500 | - | |
huawei | usg2100_firmware | * | |
huawei | usg2100 | - | |
huawei | usg2200_firmware | * | |
huawei | usg2200 | - | |
huawei | usg5100_firmware | * | |
huawei | usg5100 | - | |
huawei | usg5500_firmware | * | |
huawei | usg5500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", matchCriteriaId: "9F27EF98-F5DA-426D-9CDF-8E425A0B212A", versionEndIncluding: "v100r002c03", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:fusionmanager:*:*:*:*:*:*:*:*", matchCriteriaId: "1468F171-852F-4CC1-BA64-340B35501A9B", versionEndIncluding: "v100r003c00", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EB84AA3-8F2D-40F4-998F-D8941C38EB15", versionEndIncluding: "v200r001c01spc800", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F49A05F-6945-4C7D-BA45-3635840485BF", versionEndIncluding: "v300r001c00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C486D62-23FD-4D64-AF97-2A70B1D6B715", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", matchCriteriaId: "56136202-9759-4A86-A52B-AE841319C4DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DD11D623-1A81-4535-9BA1-1C5A118FE70C", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", matchCriteriaId: "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", matchCriteriaId: "5140E0A4-AA43-4410-BE72-7A751B8025D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1799A24D-062B-4E70-BB59-41B8BC7D0A12", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", matchCriteriaId: "EDC12456-351D-4DA4-8576-7FE9157E61DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, { lang: "es", value: "Huawei FusionManager con software V100R002C03 y V100R003C00 podrían permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web.", }, ], id: "CVE-2014-9136", lastModified: "2024-11-21T02:20:16.207", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-02T20:59:00.453", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-18 01:16
Modified
2024-11-21 05:40
Severity ?
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "4A59F0A0-4138-4BA3-887D-5A4AE7B2F816", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "45889CE6-9A6C-48FE-B1F4-52CB85BB4809", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "1DCE606C-33E8-44C1-AD66-EDFEC391CBA8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10", }, { lang: "es", value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos. Un atacante no autenticado diseña paquetes malformados con parámetros específicos y envía los paquetes a los productos afectados. Debido a una comprobación insuficiente de los paquetes, que pueden ser explotada para causar el reinicio del proceso. Las versiones del producto afectado incluyen: IPS Module versiones V500R005C00, V500R005C10; NGFW Module versiones V500R005C00, V500R005C10; Secospace USG6300 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versiones V500R001C30, V500R001C60, V500R005C00, V500R005C10", }, ], id: "CVE-2020-9101", lastModified: "2024-11-21T05:40:01.727", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-18T01:16:35.037", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-05-23 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500 | - | |
huawei | usg9500_firmware | v500r001c00 | |
huawei | ngfw_module | - | |
huawei | ngfw_module_firmware | v500r001c00 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6300_firmware | v500r001c00 | |
huawei | secospace_usg6600 | - | |
huawei | secospace_usg6600_firmware | v500r001c00 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6500_firmware | v500r001c00 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, { lang: "es", value: "Desbordamiento de buffer en la funcionalidad Smart DNS en los firewalls Huawei NGFW Module y Secospace USG6300, USG6500, USG6600 y USG9500 con software anterior a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con \"parámetros ilegítimos\".", }, ], id: "CVE-2016-4577", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.8, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.2, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-05-23T19:59:11.197", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/90532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/90532", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.", }, { lang: "es", value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un gran error de desbordamiento de búfer de la pila, un atacante puede explotar la vulnerabilidad mediante un certificado malicioso, resultando en una denegación de servicio en los productos afectados.", }, ], id: "CVE-2019-5273", lastModified: "2024-11-21T04:44:39.013", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-26T19:15:10.967", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-27 13:15
Modified
2024-11-21 05:50
Severity ?
Summary
There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.", }, { lang: "es", value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos de Huawei. El código de un módulo presenta una lógica de juicio erróneo. Unos atacantes pueden explotar esta vulnerabilidad mediante al llevar a cabo múltiples actividades anormales para desencadenar la lógica incorrecta y causar una escritura fuera de límites. Esto puede comprometer el servicio normal de las versiones de producto module.Affected incluyen: versiones NGFW Módulo V500R005C00SPC100, V500R005C00SPC200, versiones Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; versiones Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; versiones USG9500 V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200", }, ], id: "CVE-2021-22411", lastModified: "2024-11-21T05:50:04.477", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-27T13:15:08.043", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00spc100 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00spc100 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, { lang: "es", value: "Los productos NIP6800; Secospace USG6600; USG9500 versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando el operador inicia sesión en el dispositivo y lleva a cabo algunas operaciones. Una explotación con éxito podría causar el reinicio un determinado proceso.", }, ], id: "CVE-2020-1874", lastModified: "2024-11-21T05:11:31.370", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:11.890", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-824", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados con parámetros específicos y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17253", lastModified: "2024-11-21T03:17:43.067", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.383", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a la verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19415", lastModified: "2024-11-21T04:34:43.987", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.513", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de Denegación de Servicio (DoS). Debido a un procesamiento inapropiado de paquetes IPSEC específicos, un atacante remoto puede enviar paquetes IPSEC construidos hacia los dispositivos afectados para explotar esta vulnerabilidad. Una explotación con éxito podría causar que la función IPSec del dispositivo afectado sea anormal.", }, ], id: "CVE-2020-1816", lastModified: "2024-11-21T05:11:26.260", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-18T00:15:11.337", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15335", lastModified: "2024-11-21T03:14:29.333", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.517", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-05-23 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6300 | - | |
huawei | nip6300_firmware | v500r001c00 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6500_firmware | v500r001c00 | |
huawei | secospace_antiddos8000 | - | |
huawei | secospace_antiddos8000_firmware | v500r001c00 | |
huawei | usg9500 | - | |
huawei | usg9500_firmware | v500r001c00 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6300_firmware | v500r001c00 | |
huawei | ngfw_module | - | |
huawei | ngfw_module_firmware | v500r001c00 | |
huawei | secospace_usg6600 | - | |
huawei | secospace_usg6600_firmware | v500r001c00 | |
huawei | nip6600 | - | |
huawei | nip6600_firmware | v500r001c00 | |
huawei | ips_module | - | |
huawei | ips_module_firmware | v500r001c00 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*", matchCriteriaId: "5EE75ACF-D29C-4846-932D-FB9C84E1D35F", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "7CA7ED4D-0BDB-4535-B121-F6D75D809D2D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, { lang: "es", value: "Desbordamiento de buffer en la funcionalidad Application Specific Packet Filtering (ASPF) en dispositivos Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500 y AntiDDoS8000 con software en versiones anteriores a V500R001C20SPC100 permite a atacantes remotos provocar una denegación de servicio o ejecutar código arbitrario a través de un paquete manipulado, relacionado con \"illegitimate parameters\".", }, ], id: "CVE-2016-4576", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-05-23T19:59:09.980", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/90530", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/90530", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad en la que ocurre un error de administración de memoria cuando el Módulo IPSec maneja un mensaje específico. Esto causa una lectura fuera de límite de 1 byte, comprometiendo el servicio normal.", }, ], id: "CVE-2020-1830", lastModified: "2024-11-21T05:11:27.083", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-18T00:15:11.400", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-13 15:15
Modified
2024-11-21 05:40
Severity ?
Summary
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6300_firmware | v500r001c30 | |
huawei | nip6300_firmware | v500r001c60 | |
huawei | nip6300 | - | |
huawei | nip6600_firmware | v500r001c30 | |
huawei | nip6600_firmware | v500r001c60 | |
huawei | nip6600 | - | |
huawei | secospace_usg6300_firmware | v500r001c30 | |
huawei | secospace_usg6300_firmware | v500r001c60 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6500_firmware | v500r001c30 | |
huawei | secospace_usg6500_firmware | v500r001c60 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6600_firmware | v500r001c30 | |
huawei | secospace_usg6600_firmware | v500r001c60 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, { lang: "es", value: "Algunos productos de Huawei presentan una vulnerabilidad de inyección de comandos. Debido a una comprobación insuficiente de la entrada, un atacante con privilegios elevados puede inyectar algunos códigos maliciosos en algunos archivos de los productos afectados. Una explotación con éxito puede causar una inyección de comandos. Las versiones del producto afectadas incluyen: NIP6300 versiones V500R001C30,V500R001C60; NIP6600 versiones V500R001C30,V500R001C60; Secospace USG6300 versiones V500R001C30,V500R001C60; Secospace USG6500 versiones V500R001C30,V500R001C60; Secospace USG6600 versiones V500R001C30,V500R001C60; USG9500 versiones V500R001C30,V500R001C60", }, ], id: "CVE-2020-9127", lastModified: "2024-11-21T05:40:06.217", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-13T15:15:13.220", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ips_module_firmware | v500r001c00 | |
huawei | ips_module | - | |
huawei | ngfw_module_firmware | v500r001c00 | |
huawei | ngfw_module | - | |
huawei | nip6300_firmware | v500r001c00 | |
huawei | nip6300 | - | |
huawei | nip6600_firmware | v500r001c00 | |
huawei | nip6600 | - | |
huawei | secospace_usg6300_firmware | v500r001c00 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6600_firmware | v500r001c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c00 | |
huawei | usg9500 | - | |
huawei | secospace_usg6500_firmware | v500r001c00 | |
huawei | secospace_usg6500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.", }, { lang: "es", value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00 y USG9500 V500R001C00 tienen una vulnerabilidad de validación de entradas insuficiente. Un atacante remoto no autenticado podría enviar mensajes MPLS Echo Request específicos a los productos afectados. Dada la validación de entradas insuficiente de algunos parámetros en los mensajes, la explotación con éxito podría provocar que el dispositivo se reinicie.", }, ], id: "CVE-2017-15348", lastModified: "2024-11-21T03:14:31.017", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.143", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | secospace_usg6600_firmware | v500r001c30spc100 | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc300 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc100 | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc300 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "73CEF009-33BC-4F61-9C43-F01BE6DE87F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "7412661D-D8CB-4F2C-ADDF-C4D3358E94CE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "0C986370-A4E1-4EA0-BA3E-122F4D16D3F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, { lang: "es", value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 tienen una vulnerabilidad de fuga de memoria debido a que la memoria no se libera cuando un atacante local autenticado ejecuta comandos especiales muchas veces. Un atacante podría aprovecharse de esto para provocar una fuga de memoria, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17162", lastModified: "2024-11-21T03:17:36.897", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:02.110", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19417", lastModified: "2024-11-21T04:34:44.617", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.640", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15334", lastModified: "2024-11-21T03:14:29.190", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.470", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc200 | |
huawei | usg9500 | - | |
huawei | usg9520_firmware | v500r005c00 | |
huawei | usg9520 | - | |
huawei | usg9560_firmware | v500r005c00 | |
huawei | usg9560 | - | |
huawei | usg9580_firmware | v500r005c00 | |
huawei | usg9580 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "6CAE4B21-DB0F-46BA-AEEF-878CFE2CB120", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "752FD81F-0750-4200-B732-304306D31BF9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "F890E352-DB01-4BF0-A709-0F63AE3F91AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.", }, { lang: "es", value: "Se presenta una vulnerabilidad de algoritmo no seguro en unos productos Huawei. Un módulo usa una entrada poco aleatoria en un mecanismo seguro. Unos atacantes pueden explotar esta vulnerabilidad mediante fuerza bruta para obtener mensajes confidenciales. Esto puede conllevar a un filtrado de información. Las versiones de producto afectadas incluyen: USG9500 versiones V500R001C30SPC200, V500R001C60SPC500, V500R005C00SPC200; USG9520 versiones V500R005C00; USG9560 versiones V500R005C00; USG9580 versiones V500R005C00", }, ], id: "CVE-2021-22309", lastModified: "2024-11-21T05:49:53.087", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-22T18:15:14.433", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-330", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-22 19:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ips_module_firmware | v500r005c00 | |
huawei | ips_module_firmware | v500r005c10 | |
huawei | ips_module_firmware | v500r005c20 | |
huawei | ips_module | - | |
huawei | ngfw_module_firmware | v500r005c00 | |
huawei | ngfw_module_firmware | v500r005c10 | |
huawei | ngfw_module_firmware | v500r005c20 | |
huawei | ngfw_module | - | |
huawei | semg9811_firmware | v500r005c00 | |
huawei | semg9811 | - | |
huawei | usg9500_firmware | v500r001c00 | |
huawei | usg9500_firmware | v500r001c20 | |
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c50 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500_firmware | v500r001c80 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500_firmware | v500r005c10 | |
huawei | usg9500_firmware | v500r005c20 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "BD519058-E753-440C-A954-931D8E6BA1CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "45E9ED50-031B-48F9-AD89-8596D8A6B551", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "745CD04C-C989-439A-9145-D1BF5CE0E3F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.", }, { lang: "es", value: "Se presenta una vulnerabilidad de filtrado de información en los productos de Huawei. Un módulo no trata suficientemente la entrada específica. Los atacantes con altos privilegios pueden explotar esta vulnerabilidad llevando a cabo algunas operaciones. Esto puede conllevar a un filtrado de información. Las versiones de producto afectadas incluyen: Módulo IPS versiones V500R005C00, V500R005C10, V500R005C20; Módulo NGFW versiones V500R005C00,V500R005C10, V500R005C20; SeMG9811 versiones V500R005C00; USG9500 versiones V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20", }, ], id: "CVE-2021-22342", lastModified: "2024-11-21T05:49:56.753", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-22T19:15:07.880", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.", }, { lang: "es", value: "El módulo Common Open Policy Service Protocol (COPS) en Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30 y V500R001C50 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando un mensaje especialmente manipulado a los productos afectados. La vulnerabilidad se debe a la validación insuficiente de entradas del mensaje, lo que podría resultar en un desbordamiento de búfer. Una explotación con éxito podría provocar el funcionamiento erróneo de algunos servicios.", }, ], id: "CVE-2017-15350", lastModified: "2024-11-21T03:14:31.353", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.250", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.", }, { lang: "es", value: "NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de escritura fuera de límites. Un atacante no autenticado diseña paquetes malformados con un parámetro específico y los envía hacia los productos afectados. Debido a una insuficiente comprobación de los paquetes, la cual puede ser explotada para causar el reinicio del proceso.", }, ], id: "CVE-2020-1876", lastModified: "2024-11-21T05:11:31.607", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:12.030", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*", matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, { lang: "es", value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.", }, ], id: "CVE-2017-17136", lastModified: "2024-11-21T03:17:33.370", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-05T19:29:00.487", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dado la verificación insuficiente de los paquetes, una explotación exitosa podría provocar una fuga de memoria y acabar con una denegación de servicio (DoS).", }, ], id: "CVE-2017-17257", lastModified: "2024-11-21T03:17:43.737", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.617", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:33
Severity ?
Summary
Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c50 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.", }, { lang: "es", value: "Los productos de firewall de Huawei USG9500 V500R001C50 tienen una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto que controle el dispositivo emparejado podría explotar la vulnerabilidad enviando paquetes IKE mal formados al dispositivo objetivo. Una explotación exitosa de la vulnerabilidad podría hacer que el dispositivo se reinicie.", }, ], id: "CVE-2017-8167", lastModified: "2024-11-21T03:33:27.410", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-22T19:29:03.867", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-23 16:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2D4E285D-09FB-4123-B46A-E27818ADFFDD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "C5A659FF-6019-48F8-BF60-D9FC79682435", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.", }, { lang: "es", value: "Se presenta una vulnerabilidad de algoritmo seguro débil en los productos de Huawei. Es usado un algoritmo seguro débil en un módulo. Los atacantes pueden explotar esta vulnerabilidad al capturar y analizar los mensajes entre dispositivos para obtener información. Esto puede conllevar una fuga de información. Las versiones de producto afectadas incluyen: Módulo IPS V500R005C00SPC100, V500R005C00SPC200; Módulo NGFW V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200", }, ], id: "CVE-2021-22356", lastModified: "2024-11-21T05:49:58.060", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-23T16:15:08.633", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-05 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.", }, { lang: "es", value: "Los productos Huawei NIP6800; Secospace USG6600; USG9500, presentan una vulnerabilidad de pérdida de memoria. Un atacante muy privilegiado puede explotar esta vulnerabilidad llevando a cabo continuamente operaciones específicas. Una explotación con éxito de esta vulnerabilidad puede causar un servicio anormal", }, ], id: "CVE-2020-1883", lastModified: "2024-11-21T05:11:32.500", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-05T15:15:10.910", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15338", lastModified: "2024-11-21T03:14:29.783", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.657", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*", matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.", }, { lang: "es", value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de referencia de puntero null debido a la verificación insuficiente. Un atacante local autenticado llama al descodificador PEM con un parámetro especial, lo que podría provocar una denegación de servicio (DoS).", }, ], id: "CVE-2017-17135", lastModified: "2024-11-21T03:17:33.207", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-05T19:29:00.427", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Severity ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*", matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, { lang: "es", value: "El módulo PEM de Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso se cierre inesperadamente mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.", }, ], id: "CVE-2017-17137", lastModified: "2024-11-21T03:17:33.527", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-05T19:29:00.533", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15339", lastModified: "2024-11-21T03:14:29.927", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.720", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-10-27 01:15
Modified
2024-11-21 06:14
Severity ?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "8FEB99CA-7B73-4633-9F9C-9AF54B0A43FA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "975CEC1E-D82C-45AD-B920-80961221C0BA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "C9824CC2-7B77-4FD7-9509-49FA0D94AF4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "0442199D-AF21-44E8-B604-7D64129FD25D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r013c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2836F054-A1CD-4B9C-9D4E-7DD198ED6004", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "F2ED767D-2826-4ECD-8C59-B688AC54B0CD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "4A58127B-8ED8-49AD-83CE-AF95E221E092", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r019c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A630BDAD-C254-4107-9593-1E9FB415C138", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c00:*:*:*:*:*:*:*", matchCriteriaId: "B11D63D0-072D-4E44-B254-491974603C7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r020c10:*:*:*:*:*:*:*", matchCriteriaId: "913DDCCC-0A91-458D-8A74-E4B9E9A71EC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "0FCC64B5-1BB4-4A4B-983F-D1D986CA506E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "32CA1299-EA8A-4A24-96AA-DC3C5C3B9701", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "20386C76-4480-47ED-99AD-7ADBE41C3364", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "4676DA03-36A6-40B1-BA74-75260083D10A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "C9C4217C-0FBB-46BC-B108-F53A2AF259E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "744381A0-4E85-4F0C-881B-DF2F7E1DB186", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "6D60424B-15CE-415E-8E6C-34E5DC52E6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "46FDAD12-710C-4FE1-950F-B57810649C16", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "F402F7DA-6BDF-4C53-B33B-3D8FE1B14506", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "238025D5-0E08-4708-BA6D-6E6560814525", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r019c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "35753856-3BE4-481C-8D49-077E51138633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "BAA552D9-B8ED-4DD9-B825-FDB42F7070E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "83AE1FCE-5E38-4436-96B9-57DE026BDE7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "8F2F0768-EE4C-408B-8FDD-87CBC4970688", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "8030D59B-D7AC-4155-B23C-0E77603F9DEB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "CC7D191A-1496-4A38-BD9B-4222A9CA31BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "B4342AD2-7764-4447-9341-78DF30E20416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "37C57D09-618F-44B0-86A8-5BAC25CA486F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "CD82D614-9515-4A9C-B96A-2614DDADEB7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "B45A35D3-D5CE-40F1-ABC2-9A9E6FA8FE46", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "234ED4C3-67B4-4B0E-8EA1-9A70CAAD2BCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.", }, { lang: "es", value: "Se presenta una vulnerabilidad de escritura fuera de límites en algunos productos de Huawei. La vulnerabilidad está causada por una función de un módulo que no verifica correctamente el parámetro input. Una explotación con éxito podría causar una escritura fuera de límites conllevando a una condición de denegación de servicio. Las versiones de producto afectadas incluyen: Módulo IPS V500R005C00,V500R005C20;Módulo NGFW V500R005C00;NIP6600 V500R005C00,V500R005C20; S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10; S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600; S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20", }, ], id: "CVE-2021-37129", lastModified: "2024-11-21T06:14:42.100", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-10-27T01:15:07.763", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-18 00:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de pérdida de memoria. El software no rastrea y libera suficientemente la memoria asignada mientras analiza determinado mensaje, el atacante envía el mensaje continuamente que podría consumir la memoria restante. Una explotación con éxito podría causar un agotamiento de la memoria.", }, ], id: "CVE-2020-1815", lastModified: "2024-11-21T05:11:26.107", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-18T00:15:11.257", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.", }, { lang: "es", value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de denegación de servicio. Debido a un fallo en la implementación de X.509 en los productos afectados lo que puede resultar en un bucle infinito, un atacante puede explotar la vulnerabilidad por medio de un certificado malicioso para llevar a cabo un ataque de denegación de servicio en los productos afectados.", }, ], id: "CVE-2019-5274", lastModified: "2024-11-21T04:44:39.117", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-26T19:15:11.047", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-835", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500 | - | |
huawei | oceanstor_5310_firmware | v500r007c60spc100 | |
huawei | oceanstor_5310 | 5.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:oceanstor_5310_firmware:v500r007c60spc100:*:*:*:*:*:*:*", matchCriteriaId: "58CACDE1-B634-4617-9C06-CEF8C15560E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:oceanstor_5310:5.0:*:*:*:*:*:*:*", matchCriteriaId: "9164E876-5E19-4A87-963F-8C8CC01285D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, { lang: "es", value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de error de administración de recursos. Un atacante necesita llevar a cabo operaciones específicas para desencadenar una función del dispositivo afectado. Debido a una administración de recursos inapropiada de la función, la vulnerabilidad puede ser explotada para causar un servicio anormal en los dispositivos afectados.", }, ], id: "CVE-2020-1881", lastModified: "2024-11-21T05:11:32.250", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:12.170", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", }, { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-05 19:29
Modified
2024-11-21 03:17
Severity ?
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "10CBC93B-5CF6-45BF-A90A-84B7693E27FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B17A34EF-677D-4264-82FB-F7F582C9F56B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "410E8DAA-E961-46E1-96E2-3AC4B40D8359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "F91DC34F-C000-4E51-A70E-38610D31AE53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BC1D26AA-09DF-49DA-930F-A2EAEA486361", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "E364889D-CDEE-4D8C-82E5-6D5BC3DD768A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "B6F69BC3-E6C0-4E70-AC13-D79D840579DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", matchCriteriaId: "5973A534-F961-4A97-B20E-994BA28AFE29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "40745A01-E5AC-4207-A34F-D8E7F7231F83", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "48B5A9B7-A931-4806-8AC7-302C6CA49CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "A9EA93B5-01A5-4506-9B0A-993621E6940E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "2377CD30-6F57-46CB-9DD1-E29458A7D928", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D78DAB13-32AA-4813-AB0A-0EA870F41183", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*", matchCriteriaId: "01A0EC8F-6A8A-487F-A92A-789E3789788F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30s:*:*:*:*:*:*:*", matchCriteriaId: "18553F87-9928-4AE8-87D5-EB8014999E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "60DB85A7-54F1-4726-9D9C-07CC35621C19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, { lang: "es", value: "El módulo PEM de DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 de Huawei tiene una vulnerabilidad de denegación de servicio (DoS) debido a la verificación insuficiente. Un atacante local autenticado puede provocar que el proceso entre en un deadloop mediante certificados maliciosos. El atacante puede explotar esta vulnerabilidad para provocar una denegación de servicio.", }, ], id: "CVE-2017-17138", lastModified: "2024-11-21T03:17:33.680", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-05T19:29:00.580", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 02:20
Severity ?
Summary
Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | fusionmanager | v100r002c03 | |
huawei | fusionmanager | v100r003c00 | |
huawei | usg9500_firmware | * | |
huawei | usg9500_firmware | v300r001c00 | |
huawei | usg9500 | - | |
huawei | usg2100_firmware | * | |
huawei | usg2100 | - | |
huawei | usg2200_firmware | * | |
huawei | usg2200 | - | |
huawei | usg5100_firmware | * | |
huawei | usg5100 | - | |
huawei | usg5500_firmware | * | |
huawei | usg5500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:huawei:fusionmanager:v100r002c03:*:*:*:*:*:*:*", matchCriteriaId: "433EA4EE-77D4-40B7-8DD2-BC8500A498E9", vulnerable: true, }, { criteria: "cpe:2.3:a:huawei:fusionmanager:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "53A333D1-1346-4CF3-A17A-25A8A5A92713", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EB84AA3-8F2D-40F4-998F-D8941C38EB15", versionEndIncluding: "v200r001c01spc800", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c00:*:*:*:*:*:*:*", matchCriteriaId: "52132C6A-9B3C-47A1-8889-7B55C3C2A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6C486D62-23FD-4D64-AF97-2A70B1D6B715", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg2100:-:*:*:*:*:*:*:*", matchCriteriaId: "56136202-9759-4A86-A52B-AE841319C4DF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg2200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DD11D623-1A81-4535-9BA1-1C5A118FE70C", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg2200:-:*:*:*:*:*:*:*", matchCriteriaId: "A78C3EBF-B7B0-4239-95CF-588D78FF6BA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B881A96B-5B20-44D3-A039-7EFFEFEFFAF8", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg5100:-:*:*:*:*:*:*:*", matchCriteriaId: "5140E0A4-AA43-4410-BE72-7A751B8025D1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1799A24D-062B-4E70-BB59-41B8BC7D0A12", versionEndIncluding: "v300r001c00spc900", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg5500:-:*:*:*:*:*:*:*", matchCriteriaId: "EDC12456-351D-4DA4-8576-7FE9157E61DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, { lang: "es", value: "Huawei USG9500 con software V200R001C01SPC800 y versiones anteriores, V300R001C00; USG2100 con software V300R001C00SPC900 y versiones anteriores; USG2200 con software V300R001C00SPC900; USG5100 con software V300R001C00SPC900 podrían permitir a un atacante remoto no autenticado, llevar a cabo un ataque de CSRF contra el usuario de la interfaz web.", }, ], id: "CVE-2014-9137", lastModified: "2024-11-21T02:20:16.327", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-04-02T20:59:00.470", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-06-08 14:15
Modified
2024-11-21 05:40
Severity ?
Summary
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EC0C5A24-3F4E-4F1F-BC3C-7DC6707712CB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "242CFA04-AACD-47EC-88DF-C564D5FBBBB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "60A9007D-D6AD-4DB9-A0AC-1E400AEC0884", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "675FA47C-BF23-4B1B-B8F5-CE7C7585ACB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "A91B37BC-F4FD-499A-918E-6396251A0F5F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "10423C71-8077-4381-AE42-C0934BF37DA2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "CBCA01CE-C561-4065-9F00-CCF6BB8343F5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "225678FC-8643-40CB-BB08-2E9B68B58217", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c20:*:*:*:*:*:*:*", matchCriteriaId: "5524ABE8-D4C4-4BCC-BB57-D1E47480330D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c30:*:*:*:*:*:*:*", matchCriteriaId: "DF7910DC-DBD9-4C31-BA1C-7F6A2BEDDD24", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "22251FD6-AF00-4A49-BAA1-282601530155", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "BD519058-E753-440C-A954-931D8E6BA1CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "90CC612C-820C-4A6E-ABA8-4DE8E4E050AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "E1C89C59-247A-490C-BA4C-F6F063A88F66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "FDC28A80-E6FE-49AB-AD2D-BF856FB917CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "2CF85B0A-2737-4CF8-9535-E38EA164395A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "0ABF1FF0-52D2-4C0C-8225-D0C17A749A4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "8FEB99CA-7B73-4633-9F9C-9AF54B0A43FA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "825F695B-F709-466C-BC05-B1C505991EFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "A8777EF7-D23B-4068-AB89-B0C2418E22B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "3C592F82-9646-47E9-832C-4B3B33CB4B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "3EC5407A-FAFF-4B09-AB3A-65510DFD4510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "68E9D32D-46F1-495B-BF83-308DFF8822F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "4A59F0A0-4138-4BA3-887D-5A4AE7B2F816", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "043FF83A-3035-43EB-961F-D8552E2271BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "E6A44500-3128-4A34-B639-28824BF60CED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "45889CE6-9A6C-48FE-B1F4-52CB85BB4809", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "ACFBBC28-71B4-40FE-9213-ABAC31451464", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "1DCE606C-33E8-44C1-AD66-EDFEC391CBA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "19166676-7BD6-447E-82BF-F1D68A1C750F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "745CD04C-C989-439A-9145-D1BF5CE0E3F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20:*:*:*:*:*:*:*", matchCriteriaId: "31F8A14F-8956-493C-8062-EAB872AD0420", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.", }, { lang: "es", value: "Los productos Huawei IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 con versiones de V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30, presenta una vulnerabilidad de autenticación inapropiada. Los atacantes necesitan llevar a cabo algunas operaciones para explotar la vulnerabilidad. Una explotación con éxito puede obtener determinados permisos sobre el dispositivo", }, ], id: "CVE-2020-9099", lastModified: "2024-11-21T05:40:01.350", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-08T14:15:13.353", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00spc100 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00spc100 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de fuga de información. Debido a un procesamiento inapropiado de algunos datos, un atacante autenticado local puede explotar esta vulnerabilidad por medio de una serie de operaciones. Una explotación con éxito puede causar una fuga de información.", }, ], id: "CVE-2020-1857", lastModified: "2024-11-21T05:11:29.713", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T20:15:11.633", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.", }, { lang: "es", value: "Los productos NIP6800; Secospace USG6600; USG9500 versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando ocurre una condición anormal en determinada operación. Una explotación con éxito podría causar el reinicio de un determinado proceso. Los productos afectados incluyen: NIP6800 versiones V500R001C30, V500R001C60SPC500; Secospace USG6600 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500; USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500.", }, ], id: "CVE-2020-1875", lastModified: "2024-11-21T05:11:31.483", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:11.967", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-824", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-22 19:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6300_firmware | v500r001c00 | |
huawei | nip6300_firmware | v500r001c20 | |
huawei | nip6300_firmware | v500r001c30 | |
huawei | nip6300 | - | |
huawei | nip6600_firmware | v500r001c00 | |
huawei | nip6600_firmware | v500r001c20 | |
huawei | nip6600_firmware | v500r001c30 | |
huawei | nip6600 | - | |
huawei | secospace_usg6300_firmware | v500r001c00 | |
huawei | secospace_usg6300_firmware | v500r001c20 | |
huawei | secospace_usg6300_firmware | v500r001c30 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6500_firmware | v500r001c00 | |
huawei | secospace_usg6500_firmware | v500r001c20 | |
huawei | secospace_usg6500_firmware | v500r001c30 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6600_firmware | v500r001c00 | |
huawei | secospace_usg6600_firmware | v500r001c20 | |
huawei | secospace_usg6600_firmware | v500r001c30 | |
huawei | secospace_usg6600_firmware | v500r001c50 | |
huawei | secospace_usg6600_firmware | v500r001c60 | |
huawei | secospace_usg6600_firmware | v500r001c80 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500_firmware | v500r005c10 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c80:*:*:*:*:*:*:*", matchCriteriaId: "C0F5C89A-DA13-46D1-BDCF-0BD94F7B7861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c10:*:*:*:*:*:*:*", matchCriteriaId: "5A32EF67-5C9D-4F2F-BCC9-D5C5C9F69544", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.", }, { lang: "es", value: "Se presenta una vulnerabilidad de filtrado de información en algunos productos Huawei. Debido al almacenamiento apropiado de información específica en el archivo de registro, el atacante puede obtener la información cuando un usuario inicia sesión en el dispositivo. Una explotación con éxito puede causar un filtrado de información. versiones de productos afectados incluyen: NIP6300 versiones V500R001C00, V500R001C20, V500R001C30; NIP6600 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6300 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6500 versiones V500R001C00, V500R001C20, V500R001C30; Secospace USG6600 versiones V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80; USG9500 versiones V500R005C00, V500R005C10", }, ], id: "CVE-2021-22310", lastModified: "2024-11-21T05:49:53.197", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-22T19:15:11.773", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-532", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17254", lastModified: "2024-11-21T03:17:43.240", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.463", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dado la verificación insuficiente de los paquetes, una explotación exitosa podría provocar una fuga de memoria y acabar con una denegación de servicio (DoS).", }, ], id: "CVE-2017-17256", lastModified: "2024-11-21T03:17:43.567", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.570", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*", matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría enviar paquetes SIP especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los paquetes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-17297", lastModified: "2024-11-21T03:17:46.770", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:03.407", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de comprobación de entrada donde el módulo IPSec no comprueba un campo en un mensaje específico. Los atacantes pueden enviar mensajes específicos para causar una lectura fuera de límite, comprometiendo el servicio normal.", }, ], id: "CVE-2020-1828", lastModified: "2024-11-21T05:11:26.850", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T20:15:11.523", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-26 19:15
Modified
2024-11-21 04:44
Severity ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.", }, { lang: "es", value: "USG9500 con versiones desde V500R001C30;V500R001C60 presentan una vulnerabilidad de falta de comprobación de integridad. El software de los productos afectados no comprueba la integridad, lo que puede permitir a un atacante con privilegios altos llevar a cabo modificaciones maliciosas sin detección.", }, ], id: "CVE-2019-5272", lastModified: "2024-11-21T04:44:38.910", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-26T19:15:10.920", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-354", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-22 20:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "D7EE3877-6344-466D-90B0-68CF4A53A256", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AC4803A7-44B2-41BA-814D-151239B92CEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r007c01b102:*:*:*:*:*:*:*", matchCriteriaId: "BA273AD6-F7C0-49F3-A33F-E46B86168A98", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "933755CC-4A0B-42FB-9491-3C841059851D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "0E46ADD0-4DF7-4C87-88D6-46A2065DB5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "FB158E3E-8A26-415F-86E9-E63524EAA055", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "8E146F90-3E3F-4F23-81C0-0C4F36293711", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "2D6FF612-2F2B-4B75-8D97-86205DFCF0CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0A91097D-76DB-4E5D-B520-6BF22E73BEFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r009c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "D085F205-5C80-4A34-89A9-54F9FB8F2F69", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "099E36B0-125F-4B3F-8D4A-01F8882CF53B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "69FA8636-5936-4776-9DF2-1BD294796F0B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "A843B78A-CDB1-45A0-BBAC-6F3D69AD84DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "A59EDC82-83AD-408E-AA8E-15E221C3B009", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s1700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "342E032C-BAE5-4F15-8BAE-84F9D9AA58D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s1700:-:*:*:*:*:*:*:*", matchCriteriaId: "22FE26B5-C6D6-4A6C-8526-ED94F4F57C2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "5561195B-7385-4175-9D29-77E95E4E9AB6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "1A57254C-A4F0-47D2-8A1A-029E79BE863C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "9461516A-F5BB-4A52-A315-8C2B559528A0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "225A56F2-2EEB-4816-9A20-7A6E37C65FA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "20648023-4CC5-4606-BE8E-70A5C20D7BE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "FA744621-893C-4F7E-80A1-66559BC6D6F4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "ED5093F9-8629-4DA5-AC3A-EE5FFD7A57AB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "DD2FEF0B-B4AC-4EDB-AD25-41F4F9DA1DAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "57E9C52D-0F60-41E5-8646-1F4D908CA82C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "AFD7EF17-710B-4363-87B7-CE1B4447BF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r011c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "9A2FFFE5-5B4E-4040-BE25-A90D77AB53FE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "91E52545-B12E-43EC-B132-28FA2E511316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "17889C1C-0187-4814-940D-5BA6DDA39ECF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "11F25342-CE07-44CD-BD61-A998DFC8EF8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "D31F91CA-80E9-4C2A-AD61-A4FC08C8A83E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "0C34E6D4-67FE-4AA4-A825-9666A302F771", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r011c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "52947109-38C8-41A2-BC59-B43EA2343F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "37E3F87E-EA36-41ED-8793-F6C166FFC4A7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "82E3273C-3C33-4880-A044-389F5CB6FECA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "749528C3-5F85-4B80-98AA-FFD5574779F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2341D4F8-67E0-4B10-9D16-F2282D3EDBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "26F2CC30-626B-4FEE-BDAD-6A5990DE6384", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "38515A04-EC21-40B3-A29C-8D0A5883EA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r007c01b102:*:*:*:*:*:*:*", matchCriteriaId: "2091CE58-DB15-4D36-ABF9-5DC94D39E358", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00:*:*:*:*:*:*:*", matchCriteriaId: "0C6DC309-2FC6-4014-9C2B-8EE12C7BB08F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r010c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3BBC7227-051E-4244-9A63-760D0714DA35", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00:*:*:*:*:*:*:*", matchCriteriaId: "D42D4D0E-2E0D-448E-B83D-50A1361C048B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "90A601DF-D90C-43EB-8A56-3890CF0C252D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r011c10:*:*:*:*:*:*:*", matchCriteriaId: "1B06663D-8499-42B9-83E1-E369F1FD0070", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, { lang: "es", value: "Se presenta una vulnerabilidad de uso de la memoria previamente liberada en un producto de Huawei. Un módulo no puede tratar operaciones específicas en escenarios especiales. Los atacantes pueden explotar esta vulnerabilidad al realizar operaciones maliciosas. Esto puede causar un uso de la memoria previamente liberada, comprometiendo el servicio normal. Los productos afectados incluyen algunas versiones de NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700, S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 y USG9500", }, ], id: "CVE-2021-22321", lastModified: "2024-11-21T05:49:54.420", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-22T20:15:17.613", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-08 17:15
Modified
2024-11-21 04:34
Severity ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "00C526D0-9638-4BF3-823E-48F758FD3B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "AD9129C5-08E9-4689-8D19-478083484A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "5EDCE428-7453-4259-AAD9-091F0CF1413E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "EC5100FF-B87F-4D3B-8B01-B9038028E436", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc300t:*:*:*:*:*:*:*", matchCriteriaId: "33B61BA3-EDFB-45C3-84C5-1581F6CEFF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c00spc301t:*:*:*:*:*:*:*", matchCriteriaId: "B4145695-7ED4-4B0D-A30C-10A8183F323B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2075745B-5A7D-47AC-8E3B-98F2AF49381B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc101b001t:*:*:*:*:*:*:*", matchCriteriaId: "F9F838DA-3682-47DC-9058-ABAA6327885F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc102:*:*:*:*:*:*:*", matchCriteriaId: "2A94E752-CF8C-40EF-9499-309616765C2E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc103:*:*:*:*:*:*:*", matchCriteriaId: "80C4F484-8300-4793-AE06-EC8D8730B93C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B5F6D278-95B6-4451-A252-AD870F61026C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "CF2AFB6B-038E-4F72-9875-7AC320ECB68F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "2AB996A1-FFCC-478B-B2EA-5BF39B5217CC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "9FC8EF14-E249-49A4-8DD5-491EB1545040", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spc700:*:*:*:*:*:*:*", matchCriteriaId: "D81D19B4-82E0-48C4-A676-9D270B529F43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01spca00:*:*:*:*:*:*:*", matchCriteriaId: "C98F49A2-2B7C-406E-BB2F-C5431427BA33", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc300:*:*:*:*:*:*:*", matchCriteriaId: "5ADD081E-6FDD-49A8-84B7-B90BE9FA3B19", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc400:*:*:*:*:*:*:*", matchCriteriaId: "9FA573F8-92CF-463C-B445-9C8B82069C89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "4EA327A0-4C37-4730-A8B4-E59DB15EFF1E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01spc600:*:*:*:*:*:*:*", matchCriteriaId: "DED834B0-65AD-4905-A9EF-06DF505BC0D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r001c01sph703:*:*:*:*:*:*:*", matchCriteriaId: "1F233150-6AB0-4672-B20D-9B9DD7D5158F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "6D5E62A6-34B0-4424-B4F7-0BB55890FB5D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E1C57141-5167-4A45-B54B-E1724F414AAE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "19732856-0E1C-4A37-83C2-4FE9E0DE260A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:softco_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "FF191AC7-EB37-46BE-85EF-642D675BFC36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:softco:-:*:*:*:*:*:*:*", matchCriteriaId: "CB0BB461-988A-4E55-BEFC-C5BB8245E751", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "CA493790-6452-4EBD-ABA4-8CC2AE4523C0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E71665B-85F4-4914-812E-8E763FD5E9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "5EEB3DB2-810A-4FB2-BE52-9694824F90F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "509AFB31-BF50-4AAA-AD42-309C86C0A9D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "1E11E0F5-C34B-4745-B6F0-8DF3522FA15B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "999D02AA-1B42-4B4E-BB7B-0B063DE5F2B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "50E5A0D4-E459-4230-94DB-E94946425071", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA3C8433-FEA5-4784-8C0A-174C677AD50F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "00F48D7B-BAAB-46F8-A428-5EC68EC34EA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "F6D177F9-8A65-4E1F-9576-D03171336510", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "38671934-B566-4A73-9C97-C0236D4EEAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "382868EB-07B6-448B-AF15-8C66046C9422", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "A71366A4-11F7-42F6-A1C7-A3D3E38E0ACE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01spc100:*:*:*:*:*:*:*", matchCriteriaId: "5547844C-BEDD-4819-8080-832AF545E80A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "826F23F7-CD43-4C33-B08A-72D34DF152BE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc400:*:*:*:*:*:*:*", matchCriteriaId: "2630F664-C5D1-4E38-9ABC-C5EEC0E61B36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc500:*:*:*:*:*:*:*", matchCriteriaId: "DE7B30D7-FD50-495D-B56D-BE29C6D42831", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc600:*:*:*:*:*:*:*", matchCriteriaId: "C0AF9B11-C3EE-482C-AD20-7482C87EDEF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10spc800:*:*:*:*:*:*:*", matchCriteriaId: "EC82CFB2-6CBD-47FE-9A9F-66B3FF36EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", matchCriteriaId: "D13F79BF-2919-45A3-9AB0-9D501DDA94B5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2BD64645-CD8A-4FE3-9C28-E6001F210F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "06047C06-B5D8-4495-A5E8-03FBC65AE2FD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "D38CC7A1-D039-41BB-A795-95F5B877B9F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "18152B19-FD04-4983-B18A-0E362E8158F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "592AC67D-2210-46A4-9BB2-DA04C67E171B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "7FFE6C6E-BDF3-4841-9836-4C81A41F2129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "B6F0893C-8D47-43D7-A69B-E16F77E0F330", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "DAA427C8-B75F-4C98-BCBF-5588409CDD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "305174D3-15DE-4BAC-8AA6-699E487DDA63", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "040454F6-FCDB-4320-8933-8F7DBB9956ED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "FD78C2D6-13FA-4170-898D-D836C9DAE757", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "068AC8E5-1A15-4DF3-B021-557FA491AE38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc800pwe:*:*:*:*:*:*:*", matchCriteriaId: "A75EB727-3F43-4C93-BB8C-A115427A10F6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F14C758-4E82-41FF-9A75-EEBD18BE8882", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "0C0CBDFF-95C8-4558-8B3E-FF05AF23349C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc200:*:*:*:*:*:*:*", matchCriteriaId: "6BC5336A-313C-4FBE-B849-90FB0CD5BBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300:*:*:*:*:*:*:*", matchCriteriaId: "11F2C8F2-B1E0-4916-9D0A-DAAD8F7764E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc300t:*:*:*:*:*:*:*", matchCriteriaId: "DFBFBF45-CC70-4C81-81FD-944F1534FE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B92C07-6378-4B64-B69A-8690832C1EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "803E2C56-941D-4DF0-8758-0F82D7A61689", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc100b015t:*:*:*:*:*:*:*", matchCriteriaId: "D745C321-86C5-4CB0-93E1-6368CDB76F86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101:*:*:*:*:*:*:*", matchCriteriaId: "67AFAEF7-C9B7-46B3-B862-AD038915AEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc101tb015:*:*:*:*:*:*:*", matchCriteriaId: "FF11CB1A-17B3-4A74-8B36-AF3A5D4DC70B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc102t:*:*:*:*:*:*:*", matchCriteriaId: "EDD1DAC8-19FE-425D-BAA6-5B391B5D6319", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc103t:*:*:*:*:*:*:*", matchCriteriaId: "D3A014E8-0166-4005-B753-3EA5661AFFA9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc104t:*:*:*:*:*:*:*", matchCriteriaId: "090529B7-53B6-4385-B766-B2D338E5D965", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "629ACAC7-E17A-488A-9E16-AD7CEB0EB5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc200b022t:*:*:*:*:*:*:*", matchCriteriaId: "6C48C037-451F-4BDA-BFEA-5A35E55BB7C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc201b023t:*:*:*:*:*:*:*", matchCriteriaId: "0DF54BC9-26E9-450A-B96F-DD016DDDE39F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc202b025t:*:*:*:*:*:*:*", matchCriteriaId: "CBF3A771-4F45-4240-A48D-4F66776D36D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc203t:*:*:*:*:*:*:*", matchCriteriaId: "8498CA51-FFF7-4B4D-A81A-F6B0D92A9264", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc206t:*:*:*:*:*:*:*", matchCriteriaId: "2ED036CD-01B7-4274-9DF8-5E74C7420F4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc207t:*:*:*:*:*:*:*", matchCriteriaId: "62030EAD-35C5-4297-96C1-253437FF4E43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc208t:*:*:*:*:*:*:*", matchCriteriaId: "60B7F7B8-B6FA-49E3-B8D0-A5B0D1179503", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc209t:*:*:*:*:*:*:*", matchCriteriaId: "F067CC20-CF09-4112-BB27-311C4EC27240", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "2AF4248B-A7A6-4467-B5B8-EAEB5512A4A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400:*:*:*:*:*:*:*", matchCriteriaId: "94E14AD0-AB2C-4408-B0B3-E9A6FB50EFFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400b001:*:*:*:*:*:*:*", matchCriteriaId: "48DEB6B0-314B-4939-BB1B-2F1E6AC3E860", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc400t:*:*:*:*:*:*:*", matchCriteriaId: "5EB9A216-C879-4029-A491-B8CF3620B189", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc401t:*:*:*:*:*:*:*", matchCriteriaId: "66FFB3CF-AE82-43A7-B975-CF11979F1C77", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc402t:*:*:*:*:*:*:*", matchCriteriaId: "4AADD9EB-E088-4909-943F-E14BAF7F28C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc403t:*:*:*:*:*:*:*", matchCriteriaId: "8BCBE018-24D0-49BB-BB61-45A022D360BF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc404t:*:*:*:*:*:*:*", matchCriteriaId: "FA2EAE17-3259-4ACD-B4E0-9B6F4F6A8F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc405t:*:*:*:*:*:*:*", matchCriteriaId: "942FA7D8-8132-45EA-9BC1-3AB3EAA8806A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "BBE6271D-5378-49A6-9684-D4FBBDFEEFF6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700:*:*:*:*:*:*:*", matchCriteriaId: "83293AFA-9704-446D-85BE-6BC87EC7F573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc700t:*:*:*:*:*:*:*", matchCriteriaId: "CA6F7386-AC2A-443B-937A-044CD0655EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc701t:*:*:*:*:*:*:*", matchCriteriaId: "61F45FFD-0C26-42B6-8240-CE8F624C7C80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc702t:*:*:*:*:*:*:*", matchCriteriaId: "40DA60BC-F9F1-485F-9046-D75A5AE64903", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc703t:*:*:*:*:*:*:*", matchCriteriaId: "3D52AE7C-DBEA-4EE1-BEBA-75DF00A4C48B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800:*:*:*:*:*:*:*", matchCriteriaId: "0B7A5F36-EED2-426E-AC51-7658B473738B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc800t:*:*:*:*:*:*:*", matchCriteriaId: "92CE161D-80AA-4BF1-BB0E-24FC9A000BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spc900:*:*:*:*:*:*:*", matchCriteriaId: "FF88F072-4426-4454-8808-E6A72FE00185", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00:*:*:*:*:*:*:*", matchCriteriaId: "C4B0B1B1-C191-473C-AC86-340079491494", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca00t:*:*:*:*:*:*:*", matchCriteriaId: "5EB534BC-20C2-4A1D-A484-1BD24F572D04", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01:*:*:*:*:*:*:*", matchCriteriaId: "DB13DBE3-C404-4237-8B98-A14A22F90D17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca01t:*:*:*:*:*:*:*", matchCriteriaId: "F8A9669F-4850-4ABC-BFE7-B64C1067AE08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spca02t:*:*:*:*:*:*:*", matchCriteriaId: "FAD49670-B3BB-49FD-B9F7-28684983AC75", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcb00:*:*:*:*:*:*:*", matchCriteriaId: "83D003EE-7A77-44C4-9813-BC5CA22CCE8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcc00:*:*:*:*:*:*:*", matchCriteriaId: "E1B34ACE-188E-40AC-A1DC-E8A8BC89026F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00:*:*:*:*:*:*:*", matchCriteriaId: "45D728C8-E17C-47F1-8D75-B7317CAE8DF2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd00t:*:*:*:*:*:*:*", matchCriteriaId: "27AB96DA-2282-485D-BE1A-6757F04FC25F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd01t:*:*:*:*:*:*:*", matchCriteriaId: "D2343EDC-0E6D-44FE-92D4-AC08DDBBFBBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd02t:*:*:*:*:*:*:*", matchCriteriaId: "3451722A-E369-466C-931F-F3C2CB32E001", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd03t:*:*:*:*:*:*:*", matchCriteriaId: "77028912-B962-476C-9D99-DF786D436B21", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd04t:*:*:*:*:*:*:*", matchCriteriaId: "54A1DB67-2F87-47EE-A41F-706E56C00573", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcd05t:*:*:*:*:*:*:*", matchCriteriaId: "1949AB01-88BC-45A8-AF50-5B8BEA260384", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce00:*:*:*:*:*:*:*", matchCriteriaId: "CC4FB395-6E38-4371-A704-82676EDFBFEE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spce01t:*:*:*:*:*:*:*", matchCriteriaId: "2868B5C2-332A-4AF2-8BD9-21501C107B97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcf00:*:*:*:*:*:*:*", matchCriteriaId: "958470B0-1501-4395-B97F-39EB3418B129", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcg00:*:*:*:*:*:*:*", matchCriteriaId: "C3F20DEB-5C88-4634-B974-57F2A37ACED5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spch00:*:*:*:*:*:*:*", matchCriteriaId: "7B582DA0-97AD-4D2F-AB47-58B9CEC289DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spci00:*:*:*:*:*:*:*", matchCriteriaId: "4055D38F-BD52-4EE1-9AB5-708035D6875E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30spcj00:*:*:*:*:*:*:*", matchCriteriaId: "688C7DA4-0C61-437B-925F-4134FD2A397F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc001t:*:*:*:*:*:*:*", matchCriteriaId: "F5CE6217-242E-46F5-8CE1-D22D6C7FC204", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "DCA2F795-A63D-4694-A393-214F732B30AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc200t:*:*:*:*:*:*:*", matchCriteriaId: "2E01AEA5-2389-4CE5-9ADA-9C914E4BD88C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc201t:*:*:*:*:*:*:*", matchCriteriaId: "4F78FDC5-9A77-4859-AD7C-9FA9E4706C36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc203t:*:*:*:*:*:*:*", matchCriteriaId: "6ECA09D7-18BA-4104-A31E-3D96C0C6501E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc204t:*:*:*:*:*:*:*", matchCriteriaId: "63FBD4E3-5381-4325-B5B5-1071FDC28BE4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc205t:*:*:*:*:*:*:*", matchCriteriaId: "1B9040CB-120C-4534-9372-F1E66F7F3C5A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc206t:*:*:*:*:*:*:*", matchCriteriaId: "F4D2B187-79F3-49BC-A9CF-623387207C29", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "DDBB8516-64A7-404D-996F-1016866F87FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc400:*:*:*:*:*:*:*", matchCriteriaId: "F657CB06-388E-497F-8628-973A1C0EDC9D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F425853E-ECFB-4867-A38F-E35BAF076C08", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc600:*:*:*:*:*:*:*", matchCriteriaId: "9E8654BB-D300-4040-9C03-F27ADEEEDF99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc700:*:*:*:*:*:*:*", matchCriteriaId: "EC97DEE9-2280-4A83-99C6-A3B23187843C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc800:*:*:*:*:*:*:*", matchCriteriaId: "4626703D-6486-4999-A2CD-8040F62D2E4D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900:*:*:*:*:*:*:*", matchCriteriaId: "909E2AF2-DFD2-4AD7-BA16-E356A0FED753", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc900t:*:*:*:*:*:*:*", matchCriteriaId: "50055CE8-FDAB-4AF8-9066-9256B48F5DE3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spc901t:*:*:*:*:*:*:*", matchCriteriaId: "0716B752-F4BA-4713-823B-88B9A627177F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spca00:*:*:*:*:*:*:*", matchCriteriaId: "7B0E79EC-6E0B-4641-8D1B-DBC33A87A5F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb00:*:*:*:*:*:*:*", matchCriteriaId: "96994AC6-FF25-4818-BECC-567654965CB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcb01t:*:*:*:*:*:*:*", matchCriteriaId: "22D857BC-8CCF-45A7-9855-06C210FDAEBE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcc00:*:*:*:*:*:*:*", matchCriteriaId: "EA2593B2-0100-4693-A565-064AEC57B0C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00spcd00:*:*:*:*:*:*:*", matchCriteriaId: "5182DADD-8D18-402A-9E0A-E40FD682E4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "43F5DEC3-6589-46BA-AE6D-751BE679FE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100:*:*:*:*:*:*:*", matchCriteriaId: "78ADF4A9-4633-44CE-B5E1-84A202468C61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10spc100t:*:*:*:*:*:*:*", matchCriteriaId: "FE8C16C7-D7B4-400A-997D-E2311188EE95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10t:*:*:*:*:*:*:*", matchCriteriaId: "2563AC79-6822-47B5-81B1-7B8E0B89DFFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp02:*:*:*:*:*:*:*", matchCriteriaId: "0CCC4FFA-7667-4C15-931F-DDE0A906ECF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp03:*:*:*:*:*:*:*", matchCriteriaId: "684699EA-D32E-4E33-BAE5-95DD1125EC79", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03b013sp04:*:*:*:*:*:*:*", matchCriteriaId: "6DBB7D41-217D-4499-90F3-E8F196A13D54", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "BF0069A6-C44E-4437-82C6-CB3A276DC0D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "7590CB38-B8E7-41C6-A2E3-29C6B5EE044B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "0F3ABDFA-156D-4C26-B1B5-A443E7550E68", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "AA5DCC1E-D02D-4AFD-B2C5-4DAF527609EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "621CCEC0-A80E-4838-B246-1F955AB35EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc600:*:*:*:*:*:*:*", matchCriteriaId: "1767A728-DD4D-4BEC-8177-7295DB246E03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc700:*:*:*:*:*:*:*", matchCriteriaId: "0E568A07-DD57-40AE-883E-3DE3B0CED74B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc800:*:*:*:*:*:*:*", matchCriteriaId: "2C98D4F8-2BAF-42EF-BB4F-9B114DA729D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spc900:*:*:*:*:*:*:*", matchCriteriaId: "034865C2-C8A1-4FB9-BDE8-7B05C9B47F71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spca00:*:*:*:*:*:*:*", matchCriteriaId: "F467A7FC-B0F2-454C-825F-A9A685F8F9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcb00:*:*:*:*:*:*:*", matchCriteriaId: "527370A7-4361-43D7-9B0C-1EC3658436A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03spcc00:*:*:*:*:*:*:*", matchCriteriaId: "8124C805-982B-422C-BCEB-BEEC1B6A883B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02spc100:*:*:*:*:*:*:*", matchCriteriaId: "AEABC547-7345-4DEB-99DB-5EDAB2C8B7DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp15:*:*:*:*:*:*:*", matchCriteriaId: "0E40DF15-0B29-42BD-88EC-7F5A19796690", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b012sp16:*:*:*:*:*:*:*", matchCriteriaId: "1271BFB9-7655-44D8-BF5C-AAEB5B191C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03b015sp03:*:*:*:*:*:*:*", matchCriteriaId: "18627C53-7136-434E-AAAC-0E91714597EB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100:*:*:*:*:*:*:*", matchCriteriaId: "9C3544AA-D3C3-4B79-B102-AF8C8DB8FDB1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03lgwl01spc100b012:*:*:*:*:*:*:*", matchCriteriaId: "C9C00440-F202-43C2-9FE1-D7B1B46BA0F2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc100:*:*:*:*:*:*:*", matchCriteriaId: "7CF1DB39-2C29-4102-A824-2ABA83A9D3FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc200:*:*:*:*:*:*:*", matchCriteriaId: "6F37C402-C5B8-44D9-9C46-2E8CA5601F7B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc300:*:*:*:*:*:*:*", matchCriteriaId: "9159B699-1785-4B78-81E7-0B2C06914663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc400:*:*:*:*:*:*:*", matchCriteriaId: "6AE20FF5-BCFC-4875-9D8F-D629CFE23F67", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03spc500:*:*:*:*:*:*:*", matchCriteriaId: "0BA6963D-FD64-41E7-854E-E8A1D1933BE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "E7413DAC-3D06-4BF9-86F6-AB252F544B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "2121E3CD-830D-4AB5-85CD-518F847A1365", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "A637C741-ADD4-47CF-AF0C-1BEC88FD3491", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "2C7DA000-8759-4891-AA86-AD5C8198C942", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "9B429F2A-F96F-48F2-9338-2352A7A591C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "F279F7E4-0792-49EF-8350-6BCEAC47EC39", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "092A87B2-9DDC-4E0E-8E24-ABEF302237C3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1910_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "B5B8443A-558E-4A88-8C2D-9864698B1861", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1910:-:*:*:*:*:*:*:*", matchCriteriaId: "1D34B75B-37AD-4BDB-8443-2488A1724A36", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "94041F48-9513-46D7-BC87-C6C3BFAA7CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "0E934A38-A846-4E8E-B363-504F28B16084", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4FCCB0C7-5936-4080-9C81-636F6C2F54DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "D8D8CAA4-B4B1-4D84-B7EE-7F5AF90E1A43", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "6384012E-37D8-4F16-9AA9-2A4EBFA5C10B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "77E8A40C-20BE-4338-BBE8-0DC20FCF7104", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "9E69FE58-F3E4-4EB7-BC93-8473A92349B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "ECAB4306-2BED-4D72-B749-0560F43343B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1911_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "623B6384-EC71-433F-B847-9C3EBB6245BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1911:-:*:*:*:*:*:*:*", matchCriteriaId: "71DCB864-FE1B-4807-9E33-A704BFBAA7F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4CC1FF3E-A3F2-4D3C-A78F-B54110CEAA37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "C312637E-2B50-4D63-9927-02020BFE8CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "70E3A131-B5C2-48B8-AD39-37A4902E2EB5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "046FD7A6-B680-4E05-AA82-E8EAA26706D9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "BF13E364-E24E-40DD-AE5E-218A22B243EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "0097488A-1187-44CD-BF82-1ADAF2B8FF78", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "314A8BD9-6E5C-427D-AF90-957CAA63509B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1930_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "7E3707B5-2AE7-4A9C-8E55-3E86AB6B9CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1930:-:*:*:*:*:*:*:*", matchCriteriaId: "1EAD666B-4533-4A31-BADC-2D7469407BC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c01spc500:*:*:*:*:*:*:*", matchCriteriaId: "B441A998-B9B8-43C1-8EBE-30198327E062", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20lcrw01t:*:*:*:*:*:*:*", matchCriteriaId: "26B056FD-D248-4DD3-8297-CC1C5FF13B05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "EF78641C-2ABF-4C88-AE2B-11E8A1647E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "314BD69C-5F1C-417D-8ACC-A4E84F78C9EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "18900675-4095-448A-AD52-4DA0772B303E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20spc600t:*:*:*:*:*:*:*", matchCriteriaId: "CB400E10-3747-4855-811E-3A14209FBC6A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "9B7C50D1-F0C2-40B4-B9C2-10E9D0DD7A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "4A42D667-EC04-4129-8A0E-EF1546A84B96", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "922BCDDA-FAAE-4720-857F-E168C9AF2B86", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "4D4CA9B1-9650-4F3B-A0F3-52238CE58719", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1960_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "C0A48568-D28E-459B-86D3-0BF350D0168C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1960:-:*:*:*:*:*:*:*", matchCriteriaId: "253A9E39-A256-461D-BFD5-F9B6629089D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c01spc500t:*:*:*:*:*:*:*", matchCriteriaId: "994839C2-DE0D-4FFD-8660-D24FCDE9099F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "6C71CFF2-3A4B-4931-B457-C5D849EA0A74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "47B12FE8-3D35-413E-AC7A-866F1A81455C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc500t:*:*:*:*:*:*:*", matchCriteriaId: "C77AF8B9-54EE-4AF0-B9AB-2468070EDC8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc502:*:*:*:*:*:*:*", matchCriteriaId: "51C59007-3FB7-49A2-8ABD-8A9FE7F2005B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "170B98F3-FDD2-41E4-96B2-E1B15FAC60E8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph309:*:*:*:*:*:*:*", matchCriteriaId: "0ACE6398-CDE1-4F39-8F79-54804A27514F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "39C668B1-088F-4E5F-A380-2AD1C117EBA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "E4A08F66-354F-4B91-AD0B-F7680202F00A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "72E59FD0-FA4F-4C38-9B3F-557FD7097DF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1980_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "20683E6D-7C66-4240-B322-372DF2D3B4E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1980:-:*:*:*:*:*:*:*", matchCriteriaId: "2F6EB7F3-F04C-4838-A866-3417850FED65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "4A95CA09-88DF-4EA4-920F-3CC7574A8FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc400:*:*:*:*:*:*:*", matchCriteriaId: "FDA3018C-C09D-4C46-8566-7D8C98B244B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "6C568BC9-B999-4C14-B898-9EFEC0DC761D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "DA498493-3508-4C38-8591-D9F1EC045578", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20spc700:*:*:*:*:*:*:*", matchCriteriaId: "CB552A67-C220-4E5F-94DA-1ACEEEE59F51", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph702:*:*:*:*:*:*:*", matchCriteriaId: "311CA367-C6E5-4982-B06A-45329E0CF428", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20sph703:*:*:*:*:*:*:*", matchCriteriaId: "8CEA6B95-5836-44FC-954F-C7B726844449", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "28DFCB81-F308-4EEC-AD5D-5225D025C167", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, { lang: "es", value: "El módulo SIP de algunos productos Huawei presenta una vulnerabilidad de denegación de servicio (DoS). Un atacante remoto podría explotar estas tres vulnerabilidades mediante el envío de los mensajes especialmente diseñados hacia el dispositivo afectado. Debido a una verificación insuficiente de los paquetes, una explotación con éxito podría permitir al atacante causar desbordamiento del búfer y un bucle muerto, conllevando a una condición DoS. Los productos afectados pueden ser encontrados en https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], id: "CVE-2019-19416", lastModified: "2024-11-21T04:34:44.310", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-08T17:15:09.577", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "El módulo SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante tendría que averiguar la forma de manipular mensajes específicos en los productos afectados. Dada la validación insuficiente de los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15337", lastModified: "2024-11-21T03:14:29.633", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.610", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30 y V500R001C60SPC500; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600 y V500R001C60SPC500, presentan una vulnerabilidad de que el módulo IPSec maneja un mensaje inapropiadamente. Los atacantes pueden enviar mensajes específicos para causar una doble liberación de memoria. Esto puede comprometer el servicio normal.", }, ], id: "CVE-2020-1829", lastModified: "2024-11-21T05:11:26.960", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T21:15:12.850", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-415", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de fuga de memoria debido a un error de liberación de memoria derivado de una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para provocar una fuga de memoria, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17153", lastModified: "2024-11-21T03:17:35.667", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.720", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-22 18:15
Modified
2024-11-21 05:40
Severity ?
Summary
There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500_firmware | v500r005c00spc200 | |
huawei | usg9500_firmware | v500r005c20spc300 | |
huawei | usg9500_firmware | v500r005c20spc500 | |
huawei | usg9500_firmware | v500r005c20spc600 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "BF50C46B-73B1-4702-B9A5-8690DE89F81A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc500:*:*:*:*:*:*:*", matchCriteriaId: "4106345E-7FC8-4B6A-8BD4-A09340411BDD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c20spc600:*:*:*:*:*:*:*", matchCriteriaId: "6C5AE3B9-1AE9-4DA6-8A62-720EF3B40B4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.", }, { lang: "es", value: "Se presenta una vulnerabilidad en alguna versión de USG9500 de que el dispositivo maneja inapropiadamente la información cuando un usuario inicia sesión en el dispositivo. El atacante puede explotar la vulnerabilidad para llevar a cabo alguna operación y puede conseguir información y causar un filtrado de información", }, ], id: "CVE-2020-9212", lastModified: "2024-11-21T05:40:10.563", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-22T18:15:14.293", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-27 13:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500_firmware | v500r005c00spc200 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, { lang: "es", value: "Se presenta una vulnerabilidad de error de gestión de recursos en las versiones V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 del dispositivo USG9500. Un atacante con autenticación necesita llevar a cabo operaciones específicas para explotar la vulnerabilidad en el dispositivo afectado. Debido a una gestión inapropiada de los recursos de la función, la vulnerabilidad puede ser explotada para causar un servicio anormal en los dispositivos afectados", }, ], id: "CVE-2021-22360", lastModified: "2024-11-21T05:49:58.483", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 4.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-27T13:15:07.930", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-770", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-12-24 16:15
Modified
2024-11-21 05:40
Severity ?
Summary
There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.", }, { lang: "es", value: "Se presenta una vulnerabilidad de lectura fuera de límites en algunas versiones de NIP6800, Secospace USG6600 y USG9500. El software lee los datos más allá del final del búfer previsto cuando se analizan los mensajes DHCP, incluyendo el parámetro diseñado. Una explotación con éxito podría causar un servicio anormal", }, ], id: "CVE-2020-9201", lastModified: "2024-11-21T05:40:09.053", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-12-24T16:15:16.147", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00spc100 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00spc100 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.", }, { lang: "es", value: "Los Productos de Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; Secospace USG6600 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100; y USG9500 versiones V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de denegación de servicio. Los atacantes necesitan llevar a cabo una serie de operaciones en un escenario especial para explotar esta vulnerabilidad. Una explotación con éxito puede causar que las nuevas conexiones no puedan ser establecidas, lo que resulta en una denegación de servicio.", }, ], id: "CVE-2020-1858", lastModified: "2024-11-21T05:11:29.840", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T20:15:11.710", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", }, { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-08 19:15
Modified
2024-11-21 05:49
Severity ?
Summary
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "2D4E285D-09FB-4123-B46A-E27818ADFFDD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "C5A659FF-6019-48F8-BF60-D9FC79682435", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "3AA59256-7429-4D82-85FE-229EB033BDA8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "E728C122-5732-48FF-910C-3241EABA3DE6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "3D8E3300-4E1E-433A-87D9-983F9C1CE2B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "7D2F8A0A-AA2F-4144-923A-4B461B1A3E99", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "26CBEDA1-F057-489F-9255-C178272208CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "9EA34227-DB8B-48DF-8150-5C6815B49FA6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "322A0123-38E6-4D84-97F1-15F983DC3725", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "2FA2444C-EE5E-4DFC-A9F8-4744059EF7DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "203B31A8-8C5C-42E8-8D4F-861F90FC16FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "CF816E5F-2082-4460-ABF9-93726C5879A6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "F5DF54A7-6E29-4BB5-81FC-5EE75D892D12", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "F0DA1F00-D38C-40AF-A14D-D5EE0B0A3751", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4BE67E91-7805-4CAA-89EE-9226CFBD731B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "42C2CAD1-543D-47E2-9B12-6B2E8538C8DC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "29134400-23E7-4888-B027-A29167E95693", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "1CE35922-612B-437B-8044-56FA301E73C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "848014B8-8D79-48C3-8ED2-EA98378428F6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0E86EACC-53A8-4216-80D4-BD1BB215E151", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "F9FE889E-58A9-4D93-8054-7B845C44BDA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "AC2F5B2E-5233-4B9F-BA85-0D369C1A8805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "73B19CF4-92DF-4BB5-B9C7-76901EC5673C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "AC26B79E-CBCD-4D93-A552-1A20B155F0FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "46A3FD77-200C-40D7-A31E-6D964F9A375E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "024AA4AA-8A09-4E0B-81A0-76E2960A15FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "8FB28A28-8766-4A28-B438-117944ABD294", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BDFB70C7-8E9A-4538-A4FF-6FA820D895CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000e_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "261DD2F0-5503-4939-9761-DA1219DD5633", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000e:-:*:*:*:*:*:*:*", matchCriteriaId: "821F3BBF-CFD5-41E5-9D30-9FEBA1EE4429", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6000e_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "F666919C-2378-4D61-AF77-428F689E8071", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6000e:-:*:*:*:*:*:*:*", matchCriteriaId: "B7F76C1B-1214-4A55-926C-AB0AF7333481", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips6000e_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "D0D1B96D-834B-4B64-B026-AB2F156C8A67", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips6000e:-:*:*:*:*:*:*:*", matchCriteriaId: "609D868B-E091-49BD-A632-54DB6BBC9092", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, { lang: "es", value: "Se presenta una vulnerabilidad filtrado de memoria en algunos productos de Huawei. Un atacante remoto autenticado puede explotar esta vulnerabilidad mediante el envío de un mensaje específico al producto afectado. Debido a que no se libera la memoria asignada apropiadamente, una explotación con éxito puede causar que el servicio sea anormal. Los productos afectados incluyen algunas versiones de IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 y USG9500", }, ], id: "CVE-2021-22312", lastModified: "2024-11-21T05:49:53.430", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-08T19:15:12.727", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-11-13 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6300_firmware | v500r001c30 | |
huawei | nip6300_firmware | v500r001c60 | |
huawei | nip6300 | - | |
huawei | nip6600_firmware | v500r001c30 | |
huawei | nip6600_firmware | v500r001c60 | |
huawei | nip6600 | - | |
huawei | secospace_usg6300_firmware | v500r001c30 | |
huawei | secospace_usg6300_firmware | v500r001c60 | |
huawei | secospace_usg6300 | - | |
huawei | secospace_usg6500_firmware | v500r001c30 | |
huawei | secospace_usg6500_firmware | v500r001c60 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6600_firmware | v500r001c30 | |
huawei | secospace_usg6600_firmware | v500r001c60 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "EDD7E147-B39E-4C6F-BA5F-F046F3AE4728", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, { lang: "es", value: "Se presenta una vulnerabilidad de denegación de servicio en algunos productos de Huawei. No existe protección contra el escenario de ataque de un protocolo específico. Un atacante remoto y no autorizado puede construir escenarios de ataque, lo que conlleva a una denegación de servicio. Las versiones del producto afectadas incluyen: NIP6300 versiones V500R001C30, V500R001C60; NIP6600 versiones V500R001C30, V500R001C60; Secospace USG6300 versiones V500R500C30, V500R001C60; Secospace USRG6500C versiones V500R001C30, V500R001C60; USG9500 versiones V500R001C30, V500R001C60", }, ], id: "CVE-2020-1847", lastModified: "2024-11-21T05:11:29.093", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-11-13T15:15:12.283", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17251", lastModified: "2024-11-21T03:17:42.703", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.277", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, { lang: "es", value: "NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de acceso de puntero no válido. El sistema del software accede a un puntero no válido cuando el administrador inicia sesión en el dispositivo y lleva a cabo algunas operaciones. Una explotación con éxito podría causar el reinicio de un determinado proceso.", }, ], id: "CVE-2020-1877", lastModified: "2024-11-21T05:11:31.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:12.107", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-824", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de denegación de servicio debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para provocar un acceso no autorizado a la memoria, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17154", lastModified: "2024-11-21T03:17:35.817", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.767", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, { lang: "es", value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de fuga de memoria en el protocolo H323. Esta vulnerabilidad se debe a una protección de de verificación de paquetes insuficiente. Un atacante remoto no autenticado podría explotar esta vulnerabilidad enviando paquetes manipulados. Una explotación con éxito podría provocar una fuga de memoria y una condición de denegación de servicio (DoS) en un dispositivo afectado.", }, ], id: "CVE-2017-15332", lastModified: "2024-11-21T03:14:28.893", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.377", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar un acceso a la memoria fuera de límites, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17157", lastModified: "2024-11-21T03:17:36.247", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.923", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-18 02:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00; Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00, presentan una vulnerabilidad de desreferencia del puntero Dangling. Un atacante autenticado puede llevar a cabo algunas operaciones especiales en los productos afectados en algunos escenarios especiales para explotar está vulnerabilidad. Debido a condiciones de carrera inapropiadas de diferentes operaciones, una explotación con éxito conllevará a una desreferencia del puntero Dangling, causando algún servicio anormal.", }, ], id: "CVE-2020-1814", lastModified: "2024-11-21T05:11:25.960", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-18T02:15:10.703", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:max_presence_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "D15C564B-B409-4304-AF39-AD971BC8E82B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:max_presence:-:*:*:*:*:*:*:*", matchCriteriaId: "2E933011-8C8D-47C2-BD80-1D7D040755F8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "0BC535D5-0C05-4695-976F-ACF447431A6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*", matchCriteriaId: "386F5C31-6000-48C4-A9CA-D3F91A0549E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*", matchCriteriaId: "611E69A3-AB62-4584-B611-93583D84FCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "B9E7481E-B5B8-481C-AC35-A8029AA2DF7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00t:*:*:*:*:*:*:*", matchCriteriaId: "6F64B04C-27B1-4621-86B3-827D6F83D3B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00t:*:*:*:*:*:*:*", matchCriteriaId: "0892BC18-F3D0-4B0A-8F6D-E0C2A98E8A71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*", matchCriteriaId: "FDBEFFB4-9742-48CC-BBA6-E5DCA281B343", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, { lang: "es", value: "Los dispositivos Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02 y V100R011C03 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado podría enviar paquetes manipulados a los productos afectados. Dada la verificación insuficiente de los paquetes, una explotación exitosa podría hacer que el proceso se reinicie.", }, ], id: "CVE-2017-15331", lastModified: "2024-11-21T03:14:28.733", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.330", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00spc100 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00spc100 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, { lang: "es", value: "Huawei NIP6800 versiones V500R001C30, V500R001C60SPC500 y V500R005C00SPC100; y Secospace USG6600 y USG9500 versiones V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500 y V500R005C00SPC100, presentan una vulnerabilidad de fuga de información. Un atacante puede explotar esta vulnerabilidad mediante el envío de paquetes de petición específicos hacia los dispositivos afectados. Una explotación con éxito puede conllevar a una fuga de información.", }, ], id: "CVE-2020-1827", lastModified: "2024-11-21T05:11:26.723", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T21:15:12.757", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-404", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*", matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de desbordamiento de búfer. Un atacante remoto no autenticado podría enviar paquetes SIP especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los paquetes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-17295", lastModified: "2024-11-21T03:17:46.440", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:03.313", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:14
Severity ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "51A51677-9D99-491C-B524-C5ED5774AC03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c0:*:*:*:*:*:*:*", matchCriteriaId: "2127DAC4-427F-4AD1-A94A-904F383E9A79", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00:*:*:*:*:*:*:*", matchCriteriaId: "EAED7AC3-F922-44FE-B29C-ED7383FC30E2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", matchCriteriaId: "72ABAEF6-DC14-4C11-A570-44C23705933A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0BEF9499-2D42-49A2-BBC8-54472DEEB95A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "BC147B8B-BA90-4BE9-A018-0B85D7D85784", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "AD5D04E4-9B18-4B6C-A9B1-93A43B3D9333", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20:*:*:*:*:*:*:*", matchCriteriaId: "C82BCBDF-4F07-47F1-BB91-6148E2403133", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", matchCriteriaId: "FC865317-D874-469D-AE84-7700B0F1485C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, { lang: "es", value: "La característica de copia de seguridad SIP en DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20 y V200R003C30 tiene una vulnerabilidad de desbordamiento de búfer. Un atacante podría enviar mensajes especialmente manipulados a los productos afectados. Dada la validación insuficiente de algunos valores para los mensajes SIP, una explotación con éxito podría provocar fallos en los servicios.", }, ], id: "CVE-2017-15336", lastModified: "2024-11-21T03:14:29.480", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:00.563", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de escritura fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar una escritura en memoria fuera de límites, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17152", lastModified: "2024-11-21T03:17:35.517", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.657", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-17 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | ngfw_module_firmware | v500r001c30 | |
huawei | ngfw_module_firmware | v500r001c60 | |
huawei | ngfw_module_firmware | v500r005c00 | |
huawei | ngfw_module | - | |
huawei | nip6300_firmware | v500r001c30 | |
huawei | nip6300_firmware | v500r001c60 | |
huawei | nip6300_firmware | v500r005c00 | |
huawei | nip6300 | - | |
huawei | nip6600_firmware | v500r001c30 | |
huawei | nip6600_firmware | v500r001c60 | |
huawei | nip6600_firmware | v500r005c00 | |
huawei | nip6600 | - | |
huawei | secospace_usg6500_firmware | v500r001c30 | |
huawei | secospace_usg6500_firmware | v500r001c60 | |
huawei | secospace_usg6500_firmware | v500r005c00 | |
huawei | secospace_usg6500 | - | |
huawei | secospace_usg6600_firmware | v500r001c30 | |
huawei | secospace_usg6600_firmware | v500r001c60 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30 | |
huawei | usg9500_firmware | v500r001c60 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "10423C71-8077-4381-AE42-C0934BF37DA2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "225678FC-8643-40CB-BB08-2E9B68B58217", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9D57DC59-B234-463F-8BBD-631B7EE9928C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "A26FE369-FDB8-4425-B51A-465A41FECE7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "A3462B41-1DC4-4451-9575-F81C52F7A23C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "90C480FB-4D2C-49ED-A635-8B7BEFD95193", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "9AC093ED-A979-4484-B758-1C16DF2D6030", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "6EE084FC-27EB-4CE6-B529-508DA690C9D8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6C14DF5-42F7-470F-B3DD-52B5A0770EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "74B7C57C-7CD4-4FF0-BE51-2F4794FED7AE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, { lang: "es", value: "Los módulos Huawei NGFW, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600 y USG9500 versiones V500R001C30, V500R001C60 y V500R005C00, presentan una vulnerabilidad de fuga de información. Un atacante puede explotar esta vulnerabilidad mediante el envío de paquetes de peticiones específicos hacia los dispositivos afectados. Una explotación con éxito puede conllevar a una fuga de información.", }, ], id: "CVE-2020-1856", lastModified: "2024-11-21T05:11:29.587", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-17T21:15:13.117", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-13 23:15
Modified
2024-11-21 05:11
Severity ?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00 | |
huawei | nip6800 | - | |
huawei | s12700_firmware | v200r008c00 | |
huawei | s12700 | - | |
huawei | s2700_firmware | v200r008c00 | |
huawei | s2700 | - | |
huawei | s5700_firmware | v200r008c00 | |
huawei | s5700 | - | |
huawei | s6700_firmware | v200r008c00 | |
huawei | s6700 | - | |
huawei | s7700_firmware | v200r008c00 | |
huawei | s7700 | - | |
huawei | s9700_firmware | v200r008c00 | |
huawei | s9700 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc300 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "D6FCA659-5DF8-44EA-91B6-A80FBB68322A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", matchCriteriaId: "138C1E57-176C-46B1-9704-D9C8391CC802", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "FB8FC67E-DFD3-482E-B7D6-17464885B8DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2CD071-58E4-4061-8217-990453213470", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E22D3CFF-3353-4EE2-8933-84F395469D0D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "8DA5CF67-A58B-4666-B87E-712507233453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", matchCriteriaId: "DA7AC10D-B0DD-4206-8642-134DDD585C06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1D79CD09-3414-4105-AD59-F3D1BAC61B7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", matchCriteriaId: "8769C2C4-E333-432B-8943-CFDFAE013379", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "36AB80F7-1BD2-4169-AC70-708CE84BB15C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", matchCriteriaId: "75FAA4BF-1ED0-4059-ADA1-071AF1BF2882", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "391BFC6B-9AE6-49D7-855A-CB94AD1EE5C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*", matchCriteriaId: "0C986370-A4E1-4EA0-BA3E-122F4D16D3F1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", matchCriteriaId: "E961C6AA-400A-41CF-A230-FE7182875F1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.", }, { lang: "es", value: "Se presenta una vulnerabilidad de lectura fuera de límites en varios productos. El software lee los datos más allá del final del búfer previsto cuando se analizan determinados mensajes DHCP diseñados. Una explotación con éxito podría causar un servicio anormal. versiones afectadas de productos incluyen: NIP6800 versiones V500R001C30, V500R001C30,V500R001C60; SPC500 versiones V500R005C00; S12700 versiones V200R008C00; S2700 versiones V200R008C00; S5700 versiones V200R008C00; S6700 versiones V200R008C00; S7700 versiones V200R008C00; S9700 versiones V200R008C00; Secospace USG6600 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC200 versiones V500R001C30; SPC600 versiones V500R001C60; SPC500 versiones V500R005C00; USG9500 versiones V500R001C30; SPC300 versiones V500R001C30; SPC600 versiones V500R001C60 y SPC500 versiones V500R005C00", }, ], id: "CVE-2020-1866", lastModified: "2024-11-21T05:11:30.670", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-13T23:15:13.367", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-28 19:15
Modified
2024-11-21 05:11
Severity ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | nip6800_firmware | v500r001c30 | |
huawei | nip6800_firmware | v500r001c60spc500 | |
huawei | nip6800_firmware | v500r005c00spc100 | |
huawei | nip6800 | - | |
huawei | secospace_usg6600_firmware | v500r001c30spc200 | |
huawei | secospace_usg6600_firmware | v500r001c30spc600 | |
huawei | secospace_usg6600_firmware | v500r001c60spc500 | |
huawei | secospace_usg6600_firmware | v500r005c00spc100 | |
huawei | secospace_usg6600 | - | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "4B3D681F-E141-4BB1-9437-8BFE286CB164", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "C38F1E7A-0347-4E45-A0B6-CB8CE0D8A07E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "954A1F94-2442-4064-9DC5-14EFC2FA62F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "1CA7BE1F-853E-4CBA-8A90-BAEA0BCC6A97", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "B80E521E-1BFB-405E-9F8E-4A0734731FD0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "5226BD96-2B00-469B-AADD-CD0541610BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "4DB3FD6B-0EE4-4467-8BAE-AE52FB2906EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.", }, { lang: "es", value: "Los productos NIP6800; Secospace USG6600; USG9500 con versiones de V500R001C30; V500R001C60SPC500; V500R005C00SPC100, presentan una vulnerabilidad de lectura fuera de límites. Un atacante no autenticado diseña un mensaje malformado con un parámetro especifico y envía el mensaje hacia los productos afectados. Debido a una comprobación insuficiente del mensaje, que puede ser explotada para causar el reinicio del dispositivo.", }, ], id: "CVE-2020-1873", lastModified: "2024-11-21T05:11:31.240", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-28T19:15:11.827", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de lectura fuera de límites en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados con parámetros específicos y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17252", lastModified: "2024-11-21T03:17:42.880", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.337", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "72BC8C3E-420F-49D1-9E58-98E4E23A024F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "F5C732C2-60D0-4CC9-A2C4-76F6478159EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "50C579A9-2768-4202-9171-BC803554E923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "94682861-8E53-408E-97F2-06A22DAC5466", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "056FA6A9-8CA4-45DE-A3B0-71C4206377B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "67731A77-1DD4-49B2-B437-2850C9583750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*", matchCriteriaId: "98275088-2FBE-42F4-AAEC-DF02950B803D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c20spc900:*:*:*:*:*:*:*", matchCriteriaId: "37F044EC-B6CB-4311-859B-C061B1049D3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "A73298C1-595F-4A64-AA67-FF56D53BDEF0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*", matchCriteriaId: "C7BD4D80-D901-4082-B74D-A1D0CC24CA9F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900 y V200R003C30SPC200 tienen una vulnerabilidad de fuga de memoria. Un atacante remoto no autenticado podría enviar paquetes H323 especialmente manipulados a los productos afectados. Dado que no se libera la memoria asignada correctamente para gestionar los paquetes, una explotación con éxito podría provocar una fuga de memoria y que algunos servicios funcionen de manera errónea.", }, ], id: "CVE-2017-17296", lastModified: "2024-11-21T03:17:46.610", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:03.360", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido a una validación de entradas insuficiente. Un atacante podría aprovecharse de esto para manipular paquetes y desencadenar un acceso a la memoria fuera de límites, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17156", lastModified: "2024-11-21T03:17:36.103", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.877", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-02-15 16:29
Modified
2024-11-21 03:17
Severity ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "AEF0D589-9465-4EE0-AD03-F21217A2F22A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "8A08C914-D0C3-43E1-AA41-A7ACE64D888A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "63C87357-07E0-4982-AFFC-D7699CDB34DE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "3C45E268-47AA-4C00-B605-F4BDF6FCE0CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F014FEFD-60EF-4E8A-86E7-78D45CE3B199", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "3164827A-5A1A-43D3-B533-EA573F2B9A57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "57613658-FDB2-45FE-B063-3EEA5C4C3B3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "31DD32B6-9778-4095-A607-EFC61BC935AA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "164E93DD-62EC-4591-9FB0-E66659599751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "0443AE6A-5A62-42DB-93D3-00BA211E761A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "4FD9CA31-F5D3-474A-BA42-9B01D9F9D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "AA82768F-5CBA-469E-9004-07F2A95878EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A3E1D99F-BD6F-4DDD-BDBC-13D23F0E40FE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "966F8527-58F0-4B6B-93D2-53433F98B09B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "2308B172-E4C7-42CC-972E-4E4AF129EBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "B387A5FE-B6D6-46C8-A002-855FD109486C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B5D7CDFB-990B-496C-9EB9-430F80C19576", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4A18B5DE-9552-4C66-A674-47533719AA9A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "2B4772C8-9E09-4ABB-B75A-541CDB904F92", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "881265DF-4D78-4837-A766-BE2E0B3CA334", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "45481EA3-AB06-4C71-8994-24688EA611F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "440776E4-E48D-4932-AC89-DC9062BD63A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "909F6137-F546-4887-8538-88EBB7A400B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "91226C06-9E48-493D-A2A4-2A7619C1AB1A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "FEC1FB12-31EE-41DC-A3D1-0919E43100D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "165D9537-2E98-4A20-BE9C-71EEEDEB4D57", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68837186-E482-40E9-8F40-75B2E0AA10D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "CCFBC7B3-5886-4982-8200-8062236CB760", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "B01CA368-6476-49AB-8CE1-090F7DAA5842", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "B0D493EC-C5C8-444B-BCA6-227D047AAB06", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "80CC85C8-F102-4E5F-BAD3-9658D87CE953", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "BB63DB6A-7D35-4FD2-9707-C38098CB004E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "CD3921D5-81A0-4700-A302-7F4C276D4ABE", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B9975E43-DEAF-4738-AB02-EADA280D69E5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "B3D1AB25-9A98-46F9-853C-574CDE7E6677", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "85BBD592-7528-4CAA-AA4F-6A6B0BEC785A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "DAFC740E-19B2-4F35-935D-56B87C73CA82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "A09239A0-8680-4485-B6B7-6565500DCB36", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "68435D97-592E-4633-BE7D-E8C47D89CD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "64CD24E9-2CE1-4006-A281-90B4373CFC4E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "F22A4D97-365C-4259-9E54-77053798FD17", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "A19E9912-4CBD-4734-9E2F-F4262FDE7DEF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "9038E75D-50F4-4849-BD2C-8846A353B53E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "992C3880-BDBE-4CE1-8F9C-C2E488EC56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "0545D687-6670-41B4-A1B1-1048879658B8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B573FC8A-39A8-4256-97B7-1E85CA7260DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "59DC9D0D-9AF8-42DE-8B40-DA4764FBC92D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "FAD2D344-EFF9-4EA8-B387-2C80FC70DC44", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "CE0738D7-FDF6-4F3F-B24D-4558659F927E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4EBD6055-1957-476B-A4D0-977B41488256", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "439CB65D-401E-4566-92E1-6434A1A9DC56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "327AC408-B751-4E73-B1E3-AFD5B9EA3DBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "6E546CF7-8F50-4884-84E4-845E3AEEAEB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "F637A262-F7CE-43E9-89DD-A3FA2D1A22B0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "8BBE3431-EBFA-4C4A-97B1-6384869FD197", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "3ACA5F47-A215-40D5-A8F0-16FF8AF51FDB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "D9A01CAB-F734-474E-B2D6-72CC4FAFD316", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "9F11B551-9147-4DCA-8FEF-0874EEB83984", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B3048F85-AE72-4B2D-AC6B-314E6768D2FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "C9429428-8612-4845-97DD-BB21F536D5C1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "47C6A570-E932-441A-ADA9-F2B8C3B76974", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "3DAB40CB-963C-4BDE-B45C-F23708A37F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "BEDF2D76-BDAB-4A3F-BD52-A04B8F8EA8DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "A28D1553-532B-4A19-A3E4-2301DA1334B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "3095F561-6B8B-48F0-BF0E-11FDD8135AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "73B17639-2CB8-44B4-AF5F-E09567AFED37", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "0E963401-E680-47C7-82CE-7F80254C5BA1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "4D888E88-D444-4BD5-AFEA-479EAC71E12F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "0B7BA85B-9D77-44C2-B91D-5C8FC20B25A1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "40798CE9-F011-4A81-B299-9F15ED1C94E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "4B566B18-15AF-4D81-B708-4DF02B974208", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "2ED44F95-064A-4E85-A030-B15E88FBEAB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "F5F8C8BA-20CE-4F4B-AB13-EDF7D53F6218", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "136C075A-0069-4CA3-9174-C17B538398EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "01CBA56A-4786-4D70-A1C0-CE4FE7A5DB03", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "C1CE9D09-77BB-4376-9067-44AD8F717E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "0F9D677E-F8A7-44D0-8001-3D7300241D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "B87BE57A-F895-4A89-8265-768CF5B6B7B7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "3E8FC65E-DD9E-4179-84D4-9BC78E70AC27", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc301:*:*:*:*:*:*:*", matchCriteriaId: "D97B8657-3BDF-44D2-B22A-D47BFD787D66", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "E7C39533-D4AF-47CA-9EFD-8C69AA3E5B61", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9EC55D6F-A02A-4BE6-A25D-83C89BB3F1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "13593E94-606F-42EF-9253-4FED0F109B2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "76B53D29-9848-43A1-948B-2F468BFBEDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "4A6C40FB-306E-4461-879D-F8BE8F4BC20F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "AA6E88F3-6B23-4868-8487-0A1172D10DE5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "06C078DB-743F-4E37-A435-8FF79DA908DB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "F0EE488E-AB7D-4945-8D97-37BF2CA14505", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300:*:*:*:*:*:*:*", matchCriteriaId: "C723D96F-7D16-4167-B3D8-382C6A59265B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "6D04B355-93F0-44FB-AAD4-33D91B19A55B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "CEC19D43-B5B6-41A5-A36E-C79F32695E62", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "4FDFD04F-0B0F-43BC-AF5C-E78D0E001D72", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc300:*:*:*:*:*:*:*", matchCriteriaId: "4704C7C2-698A-4AC7-8578-33F17FC3A89E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc303:*:*:*:*:*:*:*", matchCriteriaId: "3BAEB66A-59CA-493C-89F8-9DF2A310C4F0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500:*:*:*:*:*:*:*", matchCriteriaId: "F9A19C8F-8767-491F-81A1-FB9D1A1C2836", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00spc500pwe:*:*:*:*:*:*:*", matchCriteriaId: "9E531FD6-E2D1-4D45-8D85-DC2F27821AE0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph303:*:*:*:*:*:*:*", matchCriteriaId: "D267A3FE-A65D-4E0D-BA2B-32BFAE75BA34", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00sph508:*:*:*:*:*:*:*", matchCriteriaId: "204D7B25-C780-4A26-BBFE-517BD9DC8F53", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100:*:*:*:*:*:*:*", matchCriteriaId: "98908E00-9D94-40E7-A239-29B290248E4C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc100pwe:*:*:*:*:*:*:*", matchCriteriaId: "D97F37D1-E22E-41D9-9D5C-C2D12B5A7F31", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc101:*:*:*:*:*:*:*", matchCriteriaId: "BBCB5C85-EBC7-45AB-893B-8BF994EBD1C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200:*:*:*:*:*:*:*", matchCriteriaId: "C1060F94-E175-46D8-A38D-13AEBB0407BB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200b062:*:*:*:*:*:*:*", matchCriteriaId: "B850C9DD-4321-4B67-90F5-B14E4B3DC0D3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc200pwe:*:*:*:*:*:*:*", matchCriteriaId: "EF8DE068-7DDB-441E-91AF-F0B127F6C5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300b078:*:*:*:*:*:*:*", matchCriteriaId: "83B8E60F-58F5-4B23-A97D-67E11B5668EC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20spc300pwe:*:*:*:*:*:*:*", matchCriteriaId: "5135C58D-652B-40FD-B8FB-ADEEF09E7590", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, { lang: "es", value: "IKEv2 en Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078 y V500R001C20SPC300PWE tiene una vulnerabilidad de acceso a la memoria fuera de límites debido al incumplimiento del requerimiento de alineación de 4 bytes impuesto por la CPU de MIPS. Un atacante podría aprovecharse de esto para provocar un acceso no autorizado a la memoria, lo que podría conducir a excepciones del sistema.", }, ], id: "CVE-2017-17155", lastModified: "2024-11-21T03:17:35.967", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-02-15T16:29:01.830", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de gestión de recursos en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados si se fracasa a la hora de solicitarlos a la memoria. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17258", lastModified: "2024-11-21T03:17:43.903", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.713", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-04-24 15:29
Modified
2024-11-21 03:17
Severity ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5DD9E894-321E-4A61-9DA6-677042DDD739", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "79DA91B4-77A6-4A37-8799-5E548184D49C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "42376C56-573F-4A88-B18E-43F636B17B41", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CFDB51-BF44-4433-AB2A-CFF553F8D640", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "CFE416CD-53B5-4E08-BB30-682887740C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "83D6C34F-ED85-461D-89AF-3B8C439867FF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F64071E5-6ACD-4E51-9162-B0FF3DC08E07", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "334E0095-CF32-497D-85AC-AE8AEDE4EC50", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "4459EF03-890E-446E-8702-8F7CE499FB48", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "C623D44E-463B-49A3-81F8-AD219E035B09", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", matchCriteriaId: "D4BA4150-8CA8-48BF-9D45-ABC8AC710060", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "EBB60F62-0715-4C1E-B352-A3D61B56E2AD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D125153E-FE39-49A7-95AA-9482C78E7114", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "7DB071D6-18CE-4FC5-855E-01E64F15BD3D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B053C248-3CC2-476D-95A7-90EDD8EAAD69", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C0D92A6F-B30C-4E09-91FC-9C7FFF375710", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "455D7A4E-523E-40C8-958D-59D128F3E797", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "6C3B0016-0A4A-471F-BBEA-D2E485587B41", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "5C1B1393-1D47-448D-A5FF-0B2EF74CF172", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6B64AE02-D345-4628-A086-7C63C255707C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E8DC83BF-B7AA-4654-95A2-54C43F379A9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", matchCriteriaId: "526371A8-11FE-4D00-AFBB-8E867A320B27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10spc300:*:*:*:*:*:*:*", matchCriteriaId: "D86EA007-4A57-44D9-8867-C1587E785805", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "787AC5E3-CE88-491D-8211-BAB11112019D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "868602DB-D063-4BE4-A02B-936433CD8231", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "E0A35FE7-D526-455A-934B-08D54A0302A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "85A72083-717F-4C71-A2D7-62E1C64FEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "BAB93A84-773E-4DDF-B8B6-8705D2000CBB", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "AF92D98E-60C8-43F9-B6F7-D43193D102EF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "34CCEC64-BD07-49F7-8804-98A74257F060", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A685289C-08B1-43D4-9970-84A7FC75E54B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "21DBC628-F348-4204-B212-11E8E6A0AC8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", matchCriteriaId: "137A007D-A498-483F-8B4F-DCA118B25F11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "A7C77ADC-2511-4630-B5F5-F2991EA39E0A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "622686BB-9302-449F-9351-75B189D1B184", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "5186D104-FD41-4F54-9923-25B0C8C09E22", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "344D64D1-A9B3-4BFA-ACF3-B421ED427A9F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D139E125-0A75-4094-ABFD-A47DAE94CDC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", matchCriteriaId: "2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "C7114E20-407A-4B1C-9FCE-FF367B50E0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "BE9B95EB-A848-4311-8500-9C909784393E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "BE2EC4F9-EB14-4628-9F89-34168BBD6A56", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B487D436-B96E-4781-AFFD-2136154F9166", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "2F042B27-F875-4BA3-9002-E5ADC544208B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*", matchCriteriaId: "DD069FB1-8A7E-4D29-94F2-D7F94BA306D4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "F377CE1E-77A7-447F-B692-A54682A26BB4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "2DF9B214-A3C7-4D4E-B92D-63E1085B76C2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "C5CCF46F-1B0F-4829-BB28-758777313451", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E6A7DDB3-4A2B-46A5-B952-F0FECF88373E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "6FDAED9E-1B9F-42EA-A344-E50FA1ED609A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", matchCriteriaId: "50662078-4827-4706-AE29-170E2239C5AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "32119825-AF22-44AA-8D04-1FAACF9E2E89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4A2BC38B-D016-4E83-A14E-FE8575135DD9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "B897F931-00B2-4FDF-90CE-5077416E42BC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "99EEE539-796F-4638-9EE1-0BC1BE25CA1F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5862E1A5-0222-4059-B9D7-716A6D0EB8CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "DB9A3444-A485-4B87-B910-F3DA5C8E5D74", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*", matchCriteriaId: "B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "9752658E-3CF5-4D9E-98FB-D15FD892479C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "0595B3AA-8911-44AF-996B-2F431517FBED", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*", matchCriteriaId: "1A842B77-C902-4B20-A171-3F98C75E6160", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*", matchCriteriaId: "AC61DFB2-E24C-4148-892E-A14F1EC3F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "A8D0F6C6-5A87-482B-8B2A-693AC7736CB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "B01969DE-DC37-4F2F-BB9B-5242810A8317", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", matchCriteriaId: "9309E1AA-0C4E-422C-9307-A8DD0AE5D576", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "26CFB676-658E-4DEF-8C29-13CA633D7270", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "7D395DD8-E338-457E-A4E6-D3A08DE1B571", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r007c01:*:*:*:*:*:*:*", matchCriteriaId: "4B650408-1E40-49DF-9271-6248CC1DCC89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "6E52BCED-46D1-4ED9-9A8A-41AA4B88A1AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", matchCriteriaId: "D30DC2EA-1F76-4CA6-BAC2-8DC796BE50B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "41A14BFE-B957-4BD9-AD25-01011BF9BF95", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*", matchCriteriaId: "B4072905-CA96-44F9-8868-BB20BDC56EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*", matchCriteriaId: "1CE13681-CF1A-4765-B35A-E6E674C334B4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*", matchCriteriaId: "7F77B216-3E00-4EC0-9BEB-6ACD322874C8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*", matchCriteriaId: "A5F06D60-CC92-4B27-9248-40C9CD8EF000", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*", matchCriteriaId: "03F01709-8D14-4C0D-9990-0BC01AAEE1B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r007c00spc180t:*:*:*:*:*:*:*", matchCriteriaId: "0059E57A-4F76-4F17-8C4A-1D46CB7F6473", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "D2EB46B1-A4FE-42AD-BA60-8134A34F5901", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "5A5C6B89-A46F-43C6-908B-FE5FBFB696BF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD9E893-609B-4C97-82E6-0651AEC39D14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "8871106B-D3AF-4CFB-A544-1FA411642428", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", matchCriteriaId: "7F3483B2-9EB6-4E34-900A-945C04A3160D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "3103CC5F-E44E-49D8-A100-45476CD24A91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "B1B55442-9A8C-4291-9086-17516814DFD2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "84477B1C-413A-4F74-86DC-55E58AD07AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "E11C53E6-0A9E-4F10-8BE6-0B4BC7123416", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "074FE8AB-6BE1-4E77-84E2-1D5C7205D0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ips_module_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "B135BE9A-A4B9-433F-BA82-548E0E859C0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", matchCriteriaId: "2BAD43A3-730A-4ABC-89F0-DF93A06AA60F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c10spc200:*:*:*:*:*:*:*", matchCriteriaId: "A4D17C34-47FB-478A-BB12-5F7C68045120", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "246D5D93-F372-4CA8-BFA2-250B61CCEF2A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "BD1D35DF-AD4F-4F55-BAE5-B0CC9E14D730", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "80411236-6B22-4937-87F3-E06C991B14D6", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1A8E1096-F070-4CE9-B2B4-6368890706A9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "F46A81BE-C125-4CAE-8EE1-23177FE0C21E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "1A6AACD8-9F94-4A4E-8E69-01D78BEB8711", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", matchCriteriaId: "547D4A9A-6B57-4BBA-9FFE-CF50B9AC5DF4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4B469A91-4CD0-44D2-A982-3E612B855E71", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "1856722C-597D-495D-AFCC-21E5FF6F2359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "728A7B78-6E19-4656-848F-269DB955070C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "7536A7B9-402F-4CEB-8BE4-EE3DDDBDDAEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", matchCriteriaId: "5E054182-CE33-45E3-8595-159A75BA5162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "5F2E0857-39E8-46C2-A723-9F09C052F2F9", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "CDC040A6-3E38-4B21-9779-67CF66FDC6B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "946F5FF7-412F-40F9-A492-DE8E11E7B919", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:nip6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "678FFB3B-C6E1-4694-B51C-D56E26B53E1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", matchCriteriaId: "CE8CA649-7AE1-497C-869B-B4DD315F342C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nip6800_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "1D5066C9-7581-4284-AF23-0782870B2F03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", matchCriteriaId: "875441DD-575F-4F4D-A6BD-23C38641D330", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "BE7A0E2C-8383-443D-8625-77CBC53D2140", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "DA500A69-F8E4-46A8-9B46-F318F9110C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "51387999-E9D0-497F-A309-CA5E3126EB00", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", matchCriteriaId: "E6224ECC-6949-4204-94D1-C7374C142A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rse6500_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "649BB696-BDBE-46FC-A23D-287DE306D8BB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rse6500:-:*:*:*:*:*:*:*", matchCriteriaId: "4DD9417D-0515-4B21-AD32-E6B137575D01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "5DF1DFD2-5337-45CA-A1A9-2E6622536027", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "B319F31F-94D7-468F-8F71-96F40867AEA0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "27D882C1-BFE2-4C29-86FF-C10F86323D5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "D32B9C4A-6005-4B82-B809-FF3DBF47C17B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", matchCriteriaId: "CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "D485D5E3-3819-4F3A-B841-ACB6253ACF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "D10EBBF2-8F03-472C-96DB-C72E426E4E38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "0F0AF0C0-46BF-4984-8378-954DF82EE227", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", matchCriteriaId: "9BAF601C-B8EC-42F5-95F4-274F8492F57E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", matchCriteriaId: "309B9B0E-3639-4913-9DE4-9D4DAE6B0065", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", matchCriteriaId: "4619CF2C-AB5D-475A-ACF6-61EE02306F7A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r007c02:*:*:*:*:*:*:*", matchCriteriaId: "A9EC4230-A773-4BCD-AEF6-0ECFD9FE7BE2", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", matchCriteriaId: "E497D97B-F044-4F9A-84B0-378978FBDC58", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*", matchCriteriaId: "F8E57098-7E8D-4956-82E6-1474A50569C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", matchCriteriaId: "43681AE7-5C12-4772-85A9-0A10177C6CFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "10310664-CBCC-4FD0-BF0A-77CBB0B3B94C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5600_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "6C216CE3-3481-4F96-9D10-15B627929046", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5600:-:*:*:*:*:*:*:*", matchCriteriaId: "46EE0FA6-7E53-488F-81A7-B2C906D65552", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "231B6AC5-AC4E-46CB-ACB2-9D9D4286AD18", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "7F25CE01-7CD4-43A6-B54D-F88D48DB06E1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800:-:*:*:*:*:*:*:*", matchCriteriaId: "6C80D3BB-868B-461C-B97A-9C94C9F80858", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c00:*:*:*:*:*:*:*", matchCriteriaId: "019D2365-8BD9-4243-97CC-22264F30A24E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:svn5800-c_firmware:v200r003c10:*:*:*:*:*:*:*", matchCriteriaId: "9FC3D1EE-0368-48DF-9B38-4751330E23A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:svn5800-c:-:*:*:*:*:*:*:*", matchCriteriaId: "DDD8D36D-A4F2-4423-B57E-E9933710201E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:semg9811_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "796200FB-E4C3-4579-B474-502F6D57448B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:semg9811:-:*:*:*:*:*:*:*", matchCriteriaId: "219AF4A5-4134-4265-BF69-C340665714F1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "353AFD36-2046-4E75-96FB-CBA7071C3257", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "7BC78B8F-B4BC-429D-9685-C30B47810B32", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0D137236-B70C-4AC9-A041-5857FE01F293", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "4C996915-83A1-4EA5-A8E1-F609DA879D2D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11CAA59E-F2A8-4E84-BCC5-CADA8FDA9712", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "0A8AEAB1-6106-47A2-8207-67E557A8BF80", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "64E335D2-FE4B-4316-8827-4741EC9AA674", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C281B511-7A27-4FC6-9427-AE5AD7C302F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "62F5005B-13E9-49EB-82A1-9A03F3583037", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "3B184673-1E6E-44F8-82FB-42E42E0F19D0", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "D588964F-A5F2-4D5C-AE5D-17962E599370", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "3189382E-6846-4713-A92F-ABD03683F4A5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "B3983A57-2F07-4D21-9093-1DFEAB310E26", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "627F40B6-8CD1-47EE-8937-F1FAAAB86F0D", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "F2D01ED2-70BC-411A-9BB8-A4EB04C92F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED6E342-26E7-45DF-AC3F-EFEBAE3DDDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "D10A0733-814F-4A5E-8030-3390D5C47136", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "4BA1E5B1-FB85-4889-B18B-818DB6E0F1F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c20:*:*:*:*:*:*:*", matchCriteriaId: "FB8B3C52-C668-43D7-875D-55047B26B4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v100r001c30:*:*:*:*:*:*:*", matchCriteriaId: "3142B435-CE92-4D8A-B34B-E81B672359DA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "E990766D-FBD4-404E-A783-3D2D0BC210F3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "A638ACAF-9A6F-4861-8CDB-E43FBC3C9C5B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "ADB7FBB2-1CC6-4DA3-85AB-66562B0A9198", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "72CE6722-BA5D-4AAE-9C72-36F06EB4DFF1", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60:*:*:*:*:*:*:*", matchCriteriaId: "F6AACFD2-9C9D-49E3-A911-0CF58F863EE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", matchCriteriaId: "BE469876-F873-4705-9760-097AE840A818", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c02:*:*:*:*:*:*:*", matchCriteriaId: "686651A5-6F2F-4AF3-9B96-FF5905F2303A", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "DA3EF476-42D7-4758-8DCB-373F46BF1CF5", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "9DEA387B-4F45-438F-8086-6E80B553163C", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "018039EB-7265-4B71-B462-4734FD1D0503", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*", matchCriteriaId: "1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DDD87254-ABAD-4DFF-BC0D-2CF030063D6F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "931FD3B3-A333-4277-AE55-494F5DB9F09F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*", matchCriteriaId: "45C3AF58-E030-4E12-A2FD-A4337A5021ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "DF7A4D51-314B-4A77-86A7-9C5237BC4275", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "A70F8924-DC80-4D6F-BA3E-DBFE32FED788", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F188B3-0A63-4704-9B0D-F8DF5D973FA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "73EB0020-7162-4E3C-8E6B-D2FF8D7ECF36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", matchCriteriaId: "492DABB3-66CF-47E9-92D4-518154559A7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c00:*:*:*:*:*:*:*", matchCriteriaId: "D28E0627-0B19-4616-933E-76294F83813F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:tp3206_firmware:v100r002c10:*:*:*:*:*:*:*", matchCriteriaId: "E8C4071A-502F-46E4-80FF-C6647161A178", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tp3206:-:*:*:*:*:*:*:*", matchCriteriaId: "45ED506D-5094-476B-83F0-CBBED04EF348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c00:*:*:*:*:*:*:*", matchCriteriaId: "22007E6A-68FC-4AF4-A570-95873AFBF882", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "11D1A4CC-2F7E-40AF-8874-EE3986176623", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30:*:*:*:*:*:*:*", matchCriteriaId: "80F14B3F-EA8C-4A01-9968-08ECACDA6CBD", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c50:*:*:*:*:*:*:*", matchCriteriaId: "9C329182-E16A-4E89-A43C-0DB90BDE4AA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "DC8205DE-4325-4DA8-90D1-8969642F8FAA", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9520_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2CE2D4CD-42FB-4290-8EB9-F1496F9B89BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", matchCriteriaId: "60030EDB-682F-4107-80FC-5F03CE75131D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "D94DE238-F32F-48D9-86D1-ED1F5D6F1663", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9560_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "2B31E688-B5EC-47FE-92B7-C3CF0C9FEF8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", matchCriteriaId: "96AFE94D-EDC7-4372-A1BF-8089D5551AD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01:*:*:*:*:*:*:*", matchCriteriaId: "92747AD5-0EED-44E8-BCB6-6663442ACD8E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9580_firmware:v300r001c20:*:*:*:*:*:*:*", matchCriteriaId: "24845D47-3AF8-43BA-9844-6529F8DAABD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*", matchCriteriaId: "14C9D3E2-B016-4238-A170-6C4AD1B3B76C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", matchCriteriaId: "3C83F8B1-67D2-4D4C-8FB5-2C61EDD0FCF3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", matchCriteriaId: "0ADEC8B2-CD7F-4246-88C0-E27B939829AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", matchCriteriaId: "F6208C34-D92D-4605-B4AF-6EA597CBA0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", matchCriteriaId: "2F6EACB9-6832-4B2A-9C5B-C1E2747D6359", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", matchCriteriaId: "092C9FAF-8892-4E16-9C0E-BB1E3488C6C4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "01BC9042-0485-437F-811F-F8898B3B7EA7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", matchCriteriaId: "4A29049D-F472-4772-8750-20730DA624E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", matchCriteriaId: "999117E9-90C8-4E76-90B5-7D364C0B84BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20:*:*:*:*:*:*:*", matchCriteriaId: "D60C4269-BE98-4381-8197-4787E09AD870", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*", matchCriteriaId: "88E8A1C0-CD02-4D4E-8DFC-0E03CF914C68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", matchCriteriaId: "A68709FF-9E1C-4174-A925-70A88D4376A3", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", matchCriteriaId: "A58ED692-8BED-4877-9BC9-D41386B660C1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", matchCriteriaId: "D1DC498B-F19F-403A-ACFE-F8364A78EC66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", matchCriteriaId: "573BD5BC-48CE-4752-834D-6F6368780FB2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", matchCriteriaId: "DE8FC7FB-FABD-4BC2-A0F5-3149F958EEAC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, { lang: "es", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03 y ViewPoint 9030 V100R011C02 tienen una vulnerabilidad de desreferencia de puntero null en el protocolo H323. Un atacante remoto no autenticado puede manipular paquetes mal formados y enviarlos a los productos afectados. Dada la validación insuficiente de los paquetes, esto podría explotarse para provocar el cierre inesperado del proceso.", }, ], id: "CVE-2017-17255", lastModified: "2024-11-21T03:17:43.403", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-04-24T15:29:00.527", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-21 19:15
Modified
2024-11-21 04:34
Severity ?
Summary
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30spc100 | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500_firmware | v500r005c00spc200 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.", }, { lang: "es", value: "El dispositivo USG9500 de HUAWEI con versiones de V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200, presentan una vulnerabilidad de filtrado de información. Debido a un procesamiento inapropiado del vector de inicialización usado en un algoritmo de cifrado específico, un atacante que consigue acceso a esta primitiva criptográfica puede explotar esta vulnerabilidad para causar que el valor de la confidencialidad asociada con su uso sea disminuido.", }, ], id: "CVE-2019-19411", lastModified: "2024-11-21T04:34:43.393", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 3.7, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-21T19:15:13.113", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-665", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-01-03 15:15
Modified
2024-11-21 05:11
Severity ?
Summary
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | usg9500_firmware | v500r001c30spc100 | |
huawei | usg9500_firmware | v500r001c30spc200 | |
huawei | usg9500_firmware | v500r001c30spc600 | |
huawei | usg9500_firmware | v500r001c60spc500 | |
huawei | usg9500_firmware | v500r005c00spc100 | |
huawei | usg9500_firmware | v500r005c00spc200 | |
huawei | usg9500 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc100:*:*:*:*:*:*:*", matchCriteriaId: "55A5E70C-79F7-49DF-A621-01965486E295", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", matchCriteriaId: "C0BF5257-8CD1-4951-9C53-07B85D468F8B", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", matchCriteriaId: "6E2CDEF7-F8C8-482E-B43D-DB3F0CE010F8", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", matchCriteriaId: "8A1EFB9D-5349-4EAF-9880-34F0D20011E4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", matchCriteriaId: "BE7369E3-5F3F-40D1-8690-95192131B683", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", matchCriteriaId: "ADA71C5D-4B11-401D-AEC9-907204C21476", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", matchCriteriaId: "4B6064BB-5E62-4D70-B933-05B5426EEE9C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.", }, { lang: "es", value: "USG9500 con software de versiones V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200, tiene una vulnerabilidad de administración de credenciales inapropiada. El software no administra apropiadamente determinadas credenciales. Una explotación con éxito podría causar una divulgación de información o daño, e impactar la confidencialidad o integridad.", }, ], id: "CVE-2020-1871", lastModified: "2024-11-21T05:11:30.927", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-01-03T15:15:12.133", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
CVE-2020-1816 (GCVE-0-2020-1816)
Vulnerability from cvelistv5
Published
2020-02-17 23:24
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.940Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T23:24:30", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1816", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Denial of Service (DoS) vulnerability. Due to improper processing of specific IPSEC packets, remote attackers can send constructed IPSEC packets to affected devices to exploit this vulnerability. Successful exploit could cause the IPSec function of the affected device abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1816", datePublished: "2020-02-17T23:24:30", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.940Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1830 (GCVE-0-2020-1830)
Vulnerability from cvelistv5
Published
2020-02-17 23:35
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.948Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.", }, ], problemTypes: [ { descriptions: [ { description: "Small OOB Read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T23:35:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1830", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a vulnerability that a memory management error exists when IPSec Module handing a specific message. This causes 1 byte out-of-bound read, compromising normal service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Small OOB Read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-04-ipsec-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1830", datePublished: "2020-02-17T23:35:02", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.948Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-9137 (GCVE-0-2014-9137)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-372186 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900, |
Version: USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900, |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:33:13.590Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", vendor: "n/a", versions: [ { status: "affected", version: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", }, ], }, ], datePublic: "2017-03-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, ], problemTypes: [ { descriptions: [ { description: "CSRF", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-04-02T19:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2014-9137", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", version: { version_data: [ { version_value: "USG9500,USG2100,USG2200,USG5100,USG5500, USG9500 V200R001C01SPC800 and earlier versions, All V300R001C00 versions,USG2100 V300R001C00SPC900 and earlier versions,USG2200 V300R001C00SPC900,USG5100 V300R001C00SPC900,", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei USG9500 with software V200R001C01SPC800 and earlier versions, V300R001C00; USG2100 with software V300R001C00SPC900 and earlier versions; USG2200 with software V300R001C00SPC900; USG5100 with software V300R001C00SPC900 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CSRF", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2014-9137", datePublished: "2017-04-02T20:00:00", dateReserved: "2014-11-28T00:00:00", dateUpdated: "2024-08-06T13:33:13.590Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15335 (GCVE-0-2017-15335)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.561Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15335", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15335", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.561Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17251 (GCVE-0-2017-17251)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.849Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "null pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17251", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "null pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17251", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.849Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1873 (GCVE-0-2020-1873)
Vulnerability from cvelistv5
Published
2020-02-28 18:14
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00SPC100 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.099Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.", }, ], problemTypes: [ { descriptions: [ { description: "Out-of-bounds Read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:14:50", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1873", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds read vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the device reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofboundread-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1873", datePublished: "2020-02-28T18:14:50", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.099Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17296 (GCVE-0-2017-17296)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:51:30.556Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]", }, ], }, ], datePublic: "2017-12-15T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17296", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17296", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:51:30.556Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-8167 (GCVE-0-2017-8167)
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 03:27
Severity ?
EPSS score ?
Summary
Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | USG9500 |
Version: V500R001C50 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:27:22.877Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "V500R001C50", }, ], }, ], datePublic: "2017-11-15T00:00:00", descriptions: [ { lang: "en", value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-22T18:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-11-15T00:00:00", ID: "CVE-2017-8167", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171025-01-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-8167", datePublished: "2017-11-22T19:00:00Z", dateReserved: "2017-04-25T00:00:00", dateUpdated: "2024-09-17T03:27:28.877Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17135 (GCVE-0-2017-17135)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:31
Severity ?
EPSS score ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 |
Version: DP300 V500R002C00 Version: IPS Module V500R001C00 Version: V500R001C30 Version: NGFW Module V500R001C00 Version: V500R002C00 Version: NIP6300 V500R001C00 Version: NIP6600 V500R001C00 Version: RP200 V500R002C00 Version: V600R006C00 Version: S12700 V200R007C00 Version: V200R007C01 Version: V200R008C00 Version: V200R009C00 Version: V200R010C00 Version: S1700 V200R006C10 Version: S2700 V200R006C10 Version: V200R007C00 Version: S5700 V200R006C00 Version: S6700 V200R008C00 Version: S7700 V200R007C00 Version: S9700 V200R007C00 Version: Secospace USG6300 V500R001C00 Version: Secospace USG6500 V500R001C00 Version: Secospace USG6600 V500R001C00 Version: V500R001C30S Version: TE30 V100R001C02 Version: V100R001C10 Version: TE40 V500R002C00 Version: TE50 V500R002C00 Version: TE60 V100R001C01 Version: TP3106 V100R002C00 Version: TP3206 V100R002C00 Version: V100R002C10 Version: USG9500 V500R001C00 Version: ViewPoint 9030 V100R011C02 Version: V100R011C03 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.923Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00", }, { status: "affected", version: "IPS Module V500R001C00", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "NGFW Module V500R001C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "NIP6300 V500R001C00", }, { status: "affected", version: "NIP6600 V500R001C00", }, { status: "affected", version: "RP200 V500R002C00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "S12700 V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R009C00", }, { status: "affected", version: "V200R010C00", }, { status: "affected", version: "S1700 V200R006C10", }, { status: "affected", version: "S2700 V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "S5700 V200R006C00", }, { status: "affected", version: "S6700 V200R008C00", }, { status: "affected", version: "S7700 V200R007C00", }, { status: "affected", version: "S9700 V200R007C00", }, { status: "affected", version: "Secospace USG6300 V500R001C00", }, { status: "affected", version: "Secospace USG6500 V500R001C00", }, { status: "affected", version: "Secospace USG6600 V500R001C00", }, { status: "affected", version: "V500R001C30S", }, { status: "affected", version: "TE30 V100R001C02", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "TE40 V500R002C00", }, { status: "affected", version: "TE50 V500R002C00", }, { status: "affected", version: "TE60 V100R001C01", }, { status: "affected", version: "TP3106 V100R002C00", }, { status: "affected", version: "TP3206 V100R002C00", }, { status: "affected", version: "V100R002C10", }, { status: "affected", version: "USG9500 V500R001C00", }, { status: "affected", version: "ViewPoint 9030 V100R011C02", }, { status: "affected", version: "V100R011C03", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "null pointer reference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-05T18:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-12-06T00:00:00", ID: "CVE-2017-17135", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", version: { version_data: [ { version_value: "DP300 V500R002C00", }, { version_value: "IPS Module V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NGFW Module V500R001C00", }, { version_value: "V500R002C00", }, { version_value: "NIP6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NIP6600 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "RP200 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "S12700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S1700 V200R006C10", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S2700 V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S5700 V200R006C00", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S6700 V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S7700 V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S9700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "Secospace USG6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6600 V500R001C00", }, { version_value: "V500R001C30S", }, { version_value: "TE30 V100R001C02", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE40 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE50 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE60 V100R001C01", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TP3106 V100R002C00", }, { version_value: "TP3206 V100R002C00", }, { version_value: "V100R002C10", }, { version_value: "USG9500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "ViewPoint 9030 V100R011C02", }, { version_value: "V100R011C03", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a null pointer reference vulnerability due to insufficient verification. An authenticated local attacker calls PEM decoder with special parameter which could cause a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "null pointer reference", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17135", datePublished: "2018-03-05T19:00:00Z", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-09-17T00:31:13.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1866 (GCVE-0-2020-1866)
Vulnerability from cvelistv5
Published
2021-01-13 22:22
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00 Version: V200R008C00 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 Version: V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.744Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.", }, ], problemTypes: [ { descriptions: [ { description: "Out of Bounds Read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-13T22:22:04", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1866", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;S12700;S2700;S5700;S6700;S7700;S9700;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { version_value: "V200R008C00", }, { version_value: "V200R008C00", }, { version_value: "V200R008C00", }, { version_value: "V200R008C00", }, { version_value: "V200R008C00", }, { version_value: "V200R008C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out of Bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-09-eudemon-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1866", datePublished: "2021-01-13T22:22:04", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.744Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1860 (GCVE-0-2020-1860)
Vulnerability from cvelistv5
Published
2020-02-28 18:28
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.749Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.", }, ], problemTypes: [ { descriptions: [ { description: "Access Control Bypass", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:28:16", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1860", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Access Control Bypass", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1860", datePublished: "2020-02-28T18:28:16", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.749Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1876 (GCVE-0-2020-1876)
Vulnerability from cvelistv5
Published
2020-02-28 18:42
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00 Version: V500R001C30SPC600,V500R001C60SPC500,V500R005C00 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.633Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.", }, ], problemTypes: [ { descriptions: [ { description: "Out-of-bounds Write", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:42:04", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1876", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an out-of-bounds write vulnerability. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out-of-bounds Write", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-outofwrite-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1876", datePublished: "2020-02-28T18:42:04", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.633Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1875 (GCVE-0-2020-1875)
Vulnerability from cvelistv5
Published
2020-02-28 18:05
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.739Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.", }, ], problemTypes: [ { descriptions: [ { description: "Invalid Pointer Access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:05:21", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1875", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when an abnormal condition occurs in certain operation. Successful exploit could cause certain process reboot. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500;USG9500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Invalid Pointer Access", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-01-wildpointer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1875", datePublished: "2020-02-28T18:05:21", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.739Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22342 (GCVE-0-2021-22342)
Vulnerability from cvelistv5
Published
2021-06-22 18:41
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | IPS Module;NGFW Module;SeMG9811;USG9500 |
Version: V500R005C00,V500R005C10,V500R005C20 Version: V500R005C00 Version: V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.546Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module;NGFW Module;SeMG9811;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00,V500R005C10,V500R005C20", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20", }, ], }, ], descriptions: [ { lang: "en", value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.", }, ], problemTypes: [ { descriptions: [ { description: "Information Leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-22T18:41:20", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22342", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module;NGFW Module;SeMG9811;USG9500", version: { version_data: [ { version_value: "V500R005C00,V500R005C10,V500R005C20", }, { version_value: "V500R005C00,V500R005C10,V500R005C20", }, { version_value: "V500R005C00", }, { version_value: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80,V500R005C00,V500R005C10,V500R005C20", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an information leak vulnerability in Huawei products. A module does not deal with specific input sufficiently. High privilege attackers can exploit this vulnerability by performing some operations. This can lead to information leak. Affected product versions include: IPS Module versions V500R005C00, V500R005C10, V500R005C20; NGFW Module versions V500R005C00,V500R005C10, V500R005C20; SeMG9811 versions V500R005C00; USG9500 versions V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, V500R001C80, V500R005C00, V500R005C10, V500R005C20.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leak", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210428-01-infomationleak-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22342", datePublished: "2021-06-22T18:41:20", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.546Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17136 (GCVE-0-2017-17136)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-16 16:49
Severity ?
EPSS score ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 |
Version: DP300 V500R002C00 Version: IPS Module V500R001C00 Version: V500R001C30 Version: NGFW Module V500R001C00 Version: V500R002C00 Version: NIP6300 V500R001C00 Version: NIP6600 V500R001C00 Version: RP200 V500R002C00 Version: V600R006C00 Version: S12700 V200R007C00 Version: V200R007C01 Version: V200R008C00 Version: V200R009C00 Version: V200R010C00 Version: S1700 V200R006C10 Version: S2700 V200R006C10 Version: V200R007C00 Version: S5700 V200R006C00 Version: S6700 V200R008C00 Version: S7700 V200R007C00 Version: S9700 V200R007C00 Version: Secospace USG6300 V500R001C00 Version: Secospace USG6500 V500R001C00 Version: Secospace USG6600 V500R001C00 Version: V500R001C30S Version: TE30 V100R001C02 Version: V100R001C10 Version: TE40 V500R002C00 Version: TE50 V500R002C00 Version: TE60 V100R001C01 Version: TP3106 V100R002C00 Version: TP3206 V100R002C00 Version: V100R002C10 Version: USG9500 V500R001C00 Version: ViewPoint 9030 V100R011C02 Version: V100R011C03 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.931Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00", }, { status: "affected", version: "IPS Module V500R001C00", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "NGFW Module V500R001C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "NIP6300 V500R001C00", }, { status: "affected", version: "NIP6600 V500R001C00", }, { status: "affected", version: "RP200 V500R002C00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "S12700 V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R009C00", }, { status: "affected", version: "V200R010C00", }, { status: "affected", version: "S1700 V200R006C10", }, { status: "affected", version: "S2700 V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "S5700 V200R006C00", }, { status: "affected", version: "S6700 V200R008C00", }, { status: "affected", version: "S7700 V200R007C00", }, { status: "affected", version: "S9700 V200R007C00", }, { status: "affected", version: "Secospace USG6300 V500R001C00", }, { status: "affected", version: "Secospace USG6500 V500R001C00", }, { status: "affected", version: "Secospace USG6600 V500R001C00", }, { status: "affected", version: "V500R001C30S", }, { status: "affected", version: "TE30 V100R001C02", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "TE40 V500R002C00", }, { status: "affected", version: "TE50 V500R002C00", }, { status: "affected", version: "TE60 V100R001C01", }, { status: "affected", version: "TP3106 V100R002C00", }, { status: "affected", version: "TP3206 V100R002C00", }, { status: "affected", version: "V100R002C10", }, { status: "affected", version: "USG9500 V500R001C00", }, { status: "affected", version: "ViewPoint 9030 V100R011C02", }, { status: "affected", version: "V100R011C03", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "heap overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-05T18:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-12-06T00:00:00", ID: "CVE-2017-17136", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", version: { version_data: [ { version_value: "DP300 V500R002C00", }, { version_value: "IPS Module V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NGFW Module V500R001C00", }, { version_value: "V500R002C00", }, { version_value: "NIP6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NIP6600 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "RP200 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "S12700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S1700 V200R006C10", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S2700 V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S5700 V200R006C00", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S6700 V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S7700 V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S9700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "Secospace USG6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6600 V500R001C00", }, { version_value: "V500R001C30S", }, { version_value: "TE30 V100R001C02", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE40 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE50 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE60 V100R001C01", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TP3106 V100R002C00", }, { version_value: "TP3206 V100R002C00", }, { version_value: "V100R002C10", }, { version_value: "USG9500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "ViewPoint 9030 V100R011C02", }, { version_value: "V100R011C03", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a heap overflow vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "heap overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17136", datePublished: "2018-03-05T19:00:00Z", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-09-16T16:49:17.056Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17297 (GCVE-0-2017-17297)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:51:30.638Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]", }, ], }, ], datePublic: "2017-12-15T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17297", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17297", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:51:30.638Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9213 (GCVE-0-2020-9213)
Vulnerability from cvelistv5
Published
2021-03-22 17:39
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R005C00 Version: V500R001C30,V500R001C60,V500R005C00 Version: V500R001C60,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.091Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R001C30,V500R001C60,V500R005C00", }, { status: "affected", version: "V500R001C60,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-22T17:39:26", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9213", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NGFW Module;NIP6300;NIP6600;NIP6800;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, { version_value: "V500R001C30,V500R001C60,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft many specific packets. Successful exploit may cause some services to be abnormal. Affected products include some versions of NGFW Module, NIP6300, NIP6600, NIP6800, Secospace USG6300, Secospace USG6500, Secospace USG6600 and SG9500.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-02-dos-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9213", datePublished: "2021-03-22T17:39:26", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.091Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1847 (GCVE-0-2020-1847)
Vulnerability from cvelistv5
Published
2020-11-13 14:50
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.650Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T14:50:23", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1847", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-dos-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1847", datePublished: "2020-11-13T14:50:23", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.650Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1877 (GCVE-0-2020-1877)
Vulnerability from cvelistv5
Published
2020-02-28 18:48
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.801Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, ], problemTypes: [ { descriptions: [ { description: "Invalid Pointer Access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:48:56", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1877", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an invalid pointer access vulnerability. The software system access an invalid pointer when administrator log in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Invalid Pointer Access", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-05-invalidpointer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1877", datePublished: "2020-02-28T18:48:56", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.801Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15348 (GCVE-0-2017-15348)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500, |
Version: IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00, |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.590Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500,", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00,", }, ], }, ], datePublic: "2017-11-29T00:00:00", descriptions: [ { lang: "en", value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.", }, ], problemTypes: [ { descriptions: [ { description: "Insufficient Input Validation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15348", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module,NGFW Module,NIP6300,NIP6600,Secospace USG6300,Secospace USG6500,Secospace USG6600,USG9500,", version: { version_data: [ { version_value: "IPS Module V500R001C00,NGFW Module V500R001C00,NIP6300 V500R001C00,NIP6600 V500R001C00,Secospace USG6300 V500R001C00,Secospace USG6500 V500R001C00,Secospace USG6600 V500R001C00,USG9500 V500R001C00,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Insufficient Input Validation", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-routers-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15348", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.590Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9127 (GCVE-0-2020-9127)
Vulnerability from cvelistv5
Published
2020-11-13 14:46
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.035Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, ], problemTypes: [ { descriptions: [ { description: "Command Injection", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-11-13T14:46:52", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9127", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Command Injection", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201111-02-injection-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9127", datePublished: "2020-11-13T14:46:52", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.035Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15350 (GCVE-0-2017-15350)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:57
Severity ?
EPSS score ?
Summary
The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500, |
Version: DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R00 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:57:25.468Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500,", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R00 ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15350", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,TP3206,USG9500,", version: { version_data: [ { version_value: "DP300 V500R002C00,IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20,NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50,NIP6800 V500R001C50,RP200 V500R002C00, V600R006C00,SVN5600 V200R003C00, V200R003C10,SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10,Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50,TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00,TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-buffer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15350", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:57:25.468Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22310 (GCVE-0-2021-22310)
Vulnerability from cvelistv5
Published
2021-03-22 18:38
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R001C00,V500R001C20,V500R001C30 Version: V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80 Version: V500R005C00,V500R005C10 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.540Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C00,V500R001C20,V500R001C30", }, { status: "affected", version: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80", }, { status: "affected", version: "V500R005C00,V500R005C10", }, ], }, ], descriptions: [ { lang: "en", value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.", }, ], problemTypes: [ { descriptions: [ { description: "Information Leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-22T18:38:09", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22310", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6300;NIP6600;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C00,V500R001C20,V500R001C30", }, { version_value: "V500R001C00,V500R001C20,V500R001C30", }, { version_value: "V500R001C00,V500R001C20,V500R001C30", }, { version_value: "V500R001C00,V500R001C20,V500R001C30", }, { version_value: "V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80", }, { version_value: "V500R005C00,V500R005C10", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an information leakage vulnerability in some huawei products. Due to the properly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause an information leak. Affected product versions include: NIP6300 versions V500R001C00,V500R001C20,V500R001C30;NIP6600 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6300 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6500 versions V500R001C00,V500R001C20,V500R001C30;Secospace USG6600 versions V500R001C00,V500R001C20,V500R001C30,V500R001C50,V500R001C60,V500R001C80;USG9500 versions V500R005C00,V500R005C10.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leakage", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22310", datePublished: "2021-03-22T18:38:09", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.540Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1874 (GCVE-0-2020-1874)
Vulnerability from cvelistv5
Published
2020-02-28 18:21
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00SPC100 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.532Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, ], problemTypes: [ { descriptions: [ { description: "Invalid Pointer Access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-28T18:21:52", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1874", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00SPC100", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 products versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have a invalid pointer access vulnerability. The software system access an invalid pointer when operator logs in to the device and performs some operations. Successful exploit could cause certain process reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Invalid Pointer Access", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-invalidpointer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1874", datePublished: "2020-02-28T18:21:52", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.532Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19415 (GCVE-0-2019-19415)
Vulnerability from cvelistv5
Published
2020-07-08 16:58
Modified
2024-08-05 02:16
Severity ?
EPSS score ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.092Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:58:31", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19415", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19415", datePublished: "2020-07-08T16:58:31", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.092Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1828 (GCVE-0-2020-1828)
Vulnerability from cvelistv5
Published
2020-02-17 19:49
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.", }, ], problemTypes: [ { descriptions: [ { description: "Input Validation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T19:49:51", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1828", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have an input validation vulnerability where the IPSec module does not validate a field in a specific message. Attackers can send specific message to cause out-of-bound read, compromising normal service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Input Validation", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-ipsec-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1828", datePublished: "2020-02-17T19:49:51", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.955Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1829 (GCVE-0-2020-1829)
Vulnerability from cvelistv5
Published
2020-02-17 20:16
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en | x_refsource_CONFIRM |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:31.029Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.", }, ], problemTypes: [ { descriptions: [ { description: "Double Free Memory", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T20:16:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1829", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30 and V500R001C60SPC500; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, and V500R001C60SPC500 have a vulnerability that the IPSec module handles a message improperly. Attackers can send specific message to cause double free memory. This may compromise normal service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Double Free Memory", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-03-ipsec-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1829", datePublished: "2020-02-17T20:16:01", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:31.029Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9201 (GCVE-0-2020-9201)
Vulnerability from cvelistv5
Published
2020-12-24 15:44
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60SPC500,V500R005C00 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.072Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "Out of Bounds Read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-12-24T15:44:52", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9201", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an out-of-bounds read vulnerability in some versions of NIP6800, Secospace USG6600 and USG9500. The software reads data past the end of the intended buffer when parsing DHCP messages including crafted parameter. Successful exploit could cause certain service abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out of Bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-04-eudemon-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9201", datePublished: "2020-12-24T15:44:52", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.072Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1881 (GCVE-0-2020-1881)
Vulnerability from cvelistv5
Published
2020-02-28 18:33
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en | x_refsource_MISC | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6800;Secospace USG6600;USG9500 |
Version: V500R001C30 Version: V500R001C30SPC200,V500R001C30SPC600 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.870Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600", }, ], }, ], descriptions: [ { lang: "en", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, ], problemTypes: [ { descriptions: [ { description: "Resource Management Error", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-30T04:06:13", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1881", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Resource Management Error", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-02-resource-en", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200429-01-invalidpointer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1881", datePublished: "2020-02-28T18:33:30", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.870Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-37129 (GCVE-0-2021-37129)
Vulnerability from cvelistv5
Published
2021-10-27 00:41
Modified
2024-08-04 01:16
Severity ?
EPSS score ?
Summary
There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500 |
Version: V500R005C00,V500R005C20 Version: V500R005C00 Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10 Version: V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600 Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500 Version: V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:16:03.167Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00,V500R005C20", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10", }, { status: "affected", version: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600", }, { status: "affected", version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500", }, { status: "affected", version: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600", }, ], }, ], descriptions: [ { lang: "en", value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.", }, ], problemTypes: [ { descriptions: [ { description: "Out of Bounds Write", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-27T00:41:44", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-37129", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IIPS Module;NGFW Module;NIP6600;S12700;S1700;S2700;S5700;S6700;S7700;S9700;USG9500", version: { version_data: [ { version_value: "V500R005C00,V500R005C20", }, { version_value: "V500R005C00", }, { version_value: "V500R005C00,V500R005C20", }, { version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10", }, { version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600", }, { version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600", }, { version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500", }, { version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600", }, { version_value: "V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600", }, { version_value: "V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600", }, { version_value: "V500R005C00,V500R005C20", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out of Bounds Write", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-37129", datePublished: "2021-10-27T00:41:44", dateReserved: "2021-07-20T00:00:00", dateUpdated: "2024-08-04T01:16:03.167Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17254 (GCVE-0-2017-17254)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.892Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17254", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17254", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.892Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15337 (GCVE-0-2017-15337)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.527Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15337", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15337", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.527Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1871 (GCVE-0-2020-1871)
Vulnerability from cvelistv5
Published
2020-01-03 14:25
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.977Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30SPC100", }, { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, { status: "affected", version: "V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Credentials Management", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-03T14:25:18", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1871", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC100", }, { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, { version_value: "V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Credentials Management", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200102-01-credential-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1871", datePublished: "2020-01-03T14:25:18", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.977Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1815 (GCVE-0-2020-1815)
Vulnerability from cvelistv5
Published
2020-02-17 23:18
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.981Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T23:18:39", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1815", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1815", datePublished: "2020-02-17T23:18:39", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.981Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17255 (GCVE-0-2017-17255)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:44:00.156Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "null pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17255", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 have a null pointer dereference vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "null pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17255", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:44:00.156Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-5273 (GCVE-0-2019-5273)
Vulnerability from cvelistv5
Published
2019-12-26 18:49
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:47:56.749Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-26T18:49:52", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5273", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a large heap buffer overrun error, an attacker may exploit the vulnerability by a malicious certificate, resulting a denial of service on the affected products.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5273", datePublished: "2019-12-26T18:49:52", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:47:56.749Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19411 (GCVE-0-2019-19411)
Vulnerability from cvelistv5
Published
2020-01-21 18:09
Modified
2024-08-05 02:16
Severity ?
EPSS score ?
Summary
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.114Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30SPC100,V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.", }, ], problemTypes: [ { descriptions: [ { description: "Information Leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-21T18:09:27", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19411", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC100,V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leakage", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19411", datePublished: "2020-01-21T18:09:27", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.114Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17153 (GCVE-0-2017-17153)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.924Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17153", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17153", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.924Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17257 (GCVE-0-2017-17257)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:44:00.415Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17257", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17257", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:44:00.415Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17155 (GCVE-0-2017-17155)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.879Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17155", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds memory access", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17155", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15336 (GCVE-0-2017-15336)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.684Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15336", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15336", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.684Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1814 (GCVE-0-2020-1814)
Vulnerability from cvelistv5
Published
2020-02-18 01:53
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.897Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, { product: "Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "Dangling Pointer Reference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-18T01:53:40", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1814", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, { product_name: "Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a Dangling pointer dereference vulnerability. An authenticated attacker may do some special operations in the affected products in some special scenarios to exploit the vulnerability. Due to improper race conditions of different operations, successful exploit will lead to Dangling pointer dereference, causing some service abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Dangling Pointer Reference", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-01-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1814", datePublished: "2020-02-18T01:53:40", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.897Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22360 (GCVE-0-2021-22360)
Vulnerability from cvelistv5
Published
2021-05-27 12:50
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:44:12.321Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, ], problemTypes: [ { descriptions: [ { description: "Resource Management Error", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-05-27T12:50:24", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22360", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a resource management error vulnerability in the verisions V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 of USG9500. An authentication attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Resource Management Error", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-01-resource-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22360", datePublished: "2021-05-27T12:50:24", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:44:12.321Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15332 (GCVE-0-2017-15332)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.527Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]", }, ], }, ], datePublic: "2017-11-29T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15332", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15332", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.527Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15334 (GCVE-0-2017-15334)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.504Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15334", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15334", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.504Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22312 (GCVE-0-2021-22312)
Vulnerability from cvelistv5
Published
2021-04-08 18:18
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R005C00SPC100,V500R005C00SPC200 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.509Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00SPC100,V500R005C00SPC200", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-08T18:18:36", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22312", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Leak", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-memoryleak-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22312", datePublished: "2021-04-08T18:18:36", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.509Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9099 (GCVE-0-2020-9099)
Vulnerability from cvelistv5
Published
2020-06-08 13:55
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 |
Version: V500R001C00 Version: V500R001C20 Version: V500R001C30 Version: V500R001C50 Version: V500R001C60 Version: V500R001C80 Version: V500R005C00 Version: V500R005C10 Version: V500R005C20 Version: V500R002C00 Version: V500R002C10 Version: V500R002C20 Version: V500R002C30 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.044Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R001C80", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, { status: "affected", version: "V500R005C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, { status: "affected", version: "V500R002C20", }, { status: "affected", version: "V500R002C30", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Authentication", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-08T13:55:12", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9099", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, { version_value: "V500R001C60", }, { version_value: "V500R001C80", }, { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, { version_value: "V500R005C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, { version_value: "V500R002C20", }, { version_value: "V500R002C30", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Authentication", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9099", datePublished: "2020-06-08T13:55:12", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.044Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17157 (GCVE-0-2017-17157)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.756Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17157", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds memory access", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17157", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.756Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2014-9136 (GCVE-0-2014-9136)
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 13:33
Severity ?
EPSS score ?
Summary
Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-372186 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions, |
Version: FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions, |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:33:13.586Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", vendor: "n/a", versions: [ { status: "affected", version: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", }, ], }, ], datePublic: "2017-03-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, ], problemTypes: [ { descriptions: [ { description: "CSRF", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-04-02T19:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2014-9136", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", version: { version_data: [ { version_value: "FusionManager FusionManager All V100R002C03 versions, All V100R003C00 versions,", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei FusionManager with software V100R002C03 and V100R003C00 could allow an unauthenticated, remote attacker to conduct a CSRF attack against the user of the web interface.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CSRF", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/hw-372186", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2014-9136", datePublished: "2017-04-02T20:00:00", dateReserved: "2014-11-28T00:00:00", dateUpdated: "2024-08-06T13:33:13.586Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17256 (GCVE-0-2017-17256)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.866Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17256", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a memory leak vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products. Due to insufficient verification of the packets, successful exploit could cause a memory leak and eventual denial of service (DoS) condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17256", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.866Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9212 (GCVE-0-2020-9212)
Vulnerability from cvelistv5
Published
2021-03-22 17:31
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:20.111Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600", }, ], }, ], descriptions: [ { lang: "en", value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Information Processing", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-22T17:31:13", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9212", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R005C00SPC100,V500R005C00SPC200,V500R005C20SPC300,V500R005C20SPC500,V500R005C20SPC600", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a vulnerability in some version of USG9500 that the device improperly handles the information when a user logs in to device. The attacker can exploit the vulnerability to perform some operation and can get information and cause information leak.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Information Processing", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-informationleak-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9212", datePublished: "2021-03-22T17:31:13", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:20.111Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-5272 (GCVE-0-2019-5272)
Vulnerability from cvelistv5
Published
2019-12-26 18:30
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:47:56.817Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.", }, ], problemTypes: [ { descriptions: [ { description: "Missing Integrity Checking", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-26T18:30:49", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5272", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with versions of V500R001C30;V500R001C60 have a missing integrity checking vulnerability. The software of the affected products does not check the integrity which may allow an attacker with high privilege to make malicious modifications without detection.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Missing Integrity Checking", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-digital-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5272", datePublished: "2019-12-26T18:30:49", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:47:56.817Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17156 (GCVE-0-2017-17156)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.805Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17156", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds memory access", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17156", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.805Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17253 (GCVE-0-2017-17253)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:44
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:44:00.120Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17253", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17253", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:44:00.120Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-5275 (GCVE-0-2019-5275)
Vulnerability from cvelistv5
Published
2019-12-26 18:36
Modified
2024-08-04 19:54
Severity ?
EPSS score ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:54:51.843Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-26T18:36:19", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5275", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in a heap buffer overflow when decoding a certificate, an attacker may exploit the vulnerability by a malicious certificate to perform a denial of service attack on the affected products.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5275", datePublished: "2019-12-26T18:36:19", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:54:51.843Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17252 (GCVE-0-2017-17252)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.871Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17252", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17252", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.871Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22321 (GCVE-0-2021-22321)
Vulnerability from cvelistv5
Published
2021-03-22 19:03
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R001C30,V500R001C60 Version: V500R001C30 Version: V500R001C60 Version: V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Version: V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10 Version: V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.499Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30,V500R001C60", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { status: "affected", version: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { status: "affected", version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { status: "affected", version: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, ], problemTypes: [ { descriptions: [ { description: "Use After Free", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-22T19:03:52", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22321", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6600;NIP6800;S12700;S1700;S2700;S5700;S6700;S7700;S9700;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { version_value: "V200R009C00SPC200,V200R009C00SPC500,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100", }, { version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10,V200R011C10SPC100", }, { version_value: "V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { version_value: "V200R007C01,V200R007C01B102,V200R008C00,V200R010C00,V200R010C00SPC300,V200R011C00,V200R011C00SPC100,V200R011C10", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, { version_value: "V500R001C30,V500R001C60", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a use-after-free vulnerability in a Huawei product. A module cannot deal with specific operations in special scenarios. Attackers can exploit this vulnerability by performing malicious operations. This can cause memory use-after-free, compromising normal service. Affected product include some versions of NIP6300, NIP6600, NIP6800, S1700, S2700, S5700, S6700 , S7700, S9700, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Use After Free", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210210-01-uaf-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22321", datePublished: "2021-03-22T19:03:52", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.499Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17152 (GCVE-0-2017-17152)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:44
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:44:00.391Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds write", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17152", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds write", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17152", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:44:00.391Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-9101 (GCVE-0-2020-9101)
Vulnerability from cvelistv5
Published
2020-07-17 23:05
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | IPS Module |
Version: V500R005C00 Version: V500R005C10 |
||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:19:19.829Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R005C00", }, { status: "affected", version: "V500R005C10", }, ], }, ], descriptions: [ { lang: "en", value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10", }, ], problemTypes: [ { descriptions: [ { description: "Out-of-bounds Write", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-17T23:05:27", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-9101", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module", version: { version_data: [ { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V500R005C00", }, { version_value: "V500R005C10", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out-of-bounds Write", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-9101", datePublished: "2020-07-17T23:05:27", dateReserved: "2020-02-18T00:00:00", dateUpdated: "2024-08-04T10:19:19.829Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17154 (GCVE-0-2017-17154)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500 |
Version: IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.883Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SP ...[truncated*]", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17154", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS,Module,NGFW,Module,NIP6300,NIP6600,Secospace,USG6300,Secospace,USG6500,Secospace,USG6600,USG9500", version: { version_data: [ { version_value: "IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-ikev2-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17154", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.883Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-4576 (GCVE-0-2016-4576)
Vulnerability from cvelistv5
Published
2016-05-23 19:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/90530 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:26.013Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "90530", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90530", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-11T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "90530", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90530", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-4576", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the Application Specific Packet Filtering (ASPF) functionality in the Huawei IPS Module, NGFW Module, NIP6300, NIP6600, Secospace USG6300, USG6500, USG6600, USG9500, and AntiDDoS8000 devices with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "90530", refsource: "BID", url: "http://www.securityfocus.com/bid/90530", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-aspf-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-4576", datePublished: "2016-05-23T19:00:00", dateReserved: "2016-05-11T00:00:00", dateUpdated: "2024-08-06T00:32:26.013Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-5274 (GCVE-0-2019-5274)
Vulnerability from cvelistv5
Published
2019-12-26 18:42
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:47:57.020Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, ], }, ], descriptions: [ { lang: "en", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.", }, ], problemTypes: [ { descriptions: [ { description: "denial of service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-26T18:42:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5274", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "USG9500 with versions of V500R001C30;V500R001C60 have a denial of service vulnerability. Due to a flaw in the X.509 implementation in the affected products which can result in an infinite loop, an attacker may exploit the vulnerability via a malicious certificate to perform a denial of service attack on the affected products.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "denial of service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-eudemon-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5274", datePublished: "2019-12-26T18:42:01", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:47:57.020Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19416 (GCVE-0-2019-19416)
Vulnerability from cvelistv5
Published
2020-07-08 16:55
Modified
2024-08-05 02:16
Severity ?
EPSS score ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.115Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:55:48", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19416", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19416", datePublished: "2020-07-08T16:55:48", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.115Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17258 (GCVE-0-2017-17258)
Vulnerability from cvelistv5
Published
2018-04-24 15:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.977Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006 ...[truncated*]", }, ], }, ], datePublic: "2017-12-27T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], problemTypes: [ { descriptions: [ { description: "resource management", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-04-24T14:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17258", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR3600, AR510, DP300, IPS Module, NGFW Module, NIP6300, NIP6600, NIP6800, NetEngine16EX, RSE6500, SRG1300, SRG2300, SRG3300, SVN5600, SVN5800, SVN5800-C, SeMG9811, Secospace USG6300, Secospace USG6500, Secospace USG6600, TE30, TE40, TE50, TE60, TP3106, TP3206, USG6000V, USG9500, USG9520, USG9560, USG9580, VP9660, ViewPoint 8660, ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has a resource management vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets and send the packets to the affected products in the case of failure to apply for memory. Due to insufficient validation of packets, which could be exploited to cause process crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "resource management", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17258", datePublished: "2018-04-24T15:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.977Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1883 (GCVE-0-2020-1883)
Vulnerability from cvelistv5
Published
2020-06-05 14:19
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.493Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C60SPC500", }, ], }, { product: "Secospace USG6600", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, ], }, { product: "USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-05T14:19:43", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1883", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C60SPC500", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Leak", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200603-01-memory-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1883", datePublished: "2020-06-05T14:19:43", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.493Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22356 (GCVE-0-2021-22356)
Vulnerability from cvelistv5
Published
2021-11-23 15:05
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R005C00SPC100,V500R005C00SPC200 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.543Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00SPC100,V500R005C00SPC200", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.", }, ], problemTypes: [ { descriptions: [ { description: "Weak Secure Algorithm", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-23T15:05:21", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22356", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "IPS Module;NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is a weak secure algorithm vulnerability in Huawei products. A weak secure algorithm is used in a module. Attackers can exploit this vulnerability by capturing and analyzing the messages between devices to obtain information. This can lead to information leak.Affected product versions include: IPS Module V500R005C00SPC100, V500R005C00SPC200; NGFW Module V500R005C00SPC100, V500R005C00SPC200; Secospace USG6300 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; Secospace USG6600 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200; USG9500 V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Weak Secure Algorithm", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210512-01-infomationleak-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22356", datePublished: "2021-11-23T15:05:21", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.543Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15338 (GCVE-0-2017-15338)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.494Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15338", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15338", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.494Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15339 (GCVE-0-2017-15339)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981 |
Version: DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.565Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002 ...[truncated*]", }, ], }, ], datePublic: "2017-12-01T00:00:00", descriptions: [ { lang: "en", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15339", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300,IPS Module,NGFW Module,NIP6300,NIP6600,NIP6800,RP200,SVN5600,SVN5800,SVN5800-C,SeMG9811,Secospace USG6300,Secospace USG6500,Secospace USG6600,TE30,TE40,TE50,TE60,USG9500,USG9520,USG9560,USG9580,VP9660,ViewPoint 8660,ViewPoint 9030,eSpace U1981", version: { version_data: [ { version_value: "DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171201-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15339", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.565Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-15331 (GCVE-0-2017-15331)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:50:16.586Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008 ...[truncated*]", }, ], }, ], datePublic: "2017-11-29T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, ], problemTypes: [ { descriptions: [ { description: "out-of-bounds read", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-15331", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,DP300,IPS Module,MAX PRESENCE,NGFW Module,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SMC2.0,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,Secospace USG6300,Secospace USG6500,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint 9030", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03,", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "out-of-bounds read", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-h323-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-15331", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-10-14T00:00:00", dateUpdated: "2024-08-05T19:50:16.586Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-4577 (GCVE-0-2016-4577)
Vulnerability from cvelistv5
Published
2016-05-23 19:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters."
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/90532 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:32:25.907Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", }, { name: "90532", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/90532", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-05-11T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-25T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", }, { name: "90532", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/90532", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-4577", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to \"illegitimate parameters.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en", }, { name: "90532", refsource: "BID", url: "http://www.securityfocus.com/bid/90532", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-4577", datePublished: "2016-05-23T19:00:00", dateReserved: "2016-05-11T00:00:00", dateUpdated: "2024-08-06T00:32:25.907Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1858 (GCVE-0-2020-1858)
Vulnerability from cvelistv5
Published
2020-02-17 19:30
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en | x_refsource_CONFIRM | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00SPC100 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.976Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-19T05:06:04", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1858", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei products NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; Secospace USG6600 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100; and USG9500 versions V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have a denial of service vulnerability. Attackers need to perform a series of operations in a special scenario to exploit this vulnerability. Successful exploit may cause the new connections can't be established, result in a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-dos-en", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200219-04-dos-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1858", datePublished: "2020-02-17T19:30:02", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.976Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17295 (GCVE-0-2017-17295)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:51
Severity ?
EPSS score ?
Summary
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981 |
Version: AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*] |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:51:30.562Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200 ...[truncated*]", }, ], }, ], datePublic: "2017-12-15T00:00:00", descriptions: [ { lang: "en", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "buffer overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], x_ConverterErrors: { version_name: { error: "version_name too long. Use array of versions to record more than one version.", message: "Truncated!", }, }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17295", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR3600,AR510,DP300,IPSModule,NGFWModule,NIP6300,NIP6600,NIP6800,NetEngine16EX,RP200,RSE6500,SRG1300,SRG2300,SRG3300,SVN5600,SVN5800,SVN5800-C,SeMG9811,SecospaceUSG6300,SecospaceUSG6500,SecospaceUSG6600,TE30,TE40,TE50,TE60,TP3106,TP3206,USG9500,USG9520,USG9560,USG9580,ViewPoint9030,eSpaceU1981", version: { version_data: [ { version_value: "AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "buffer overflow", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-buffer-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17295", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:51:30.562Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17138 (GCVE-0-2017-17138)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 03:44
Severity ?
EPSS score ?
Summary
PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 |
Version: DP300 V500R002C00 Version: IPS Module V500R001C00 Version: V500R001C30 Version: NGFW Module V500R001C00 Version: V500R002C00 Version: NIP6300 V500R001C00 Version: NIP6600 V500R001C00 Version: RP200 V500R002C00 Version: V600R006C00 Version: S12700 V200R007C00 Version: V200R007C01 Version: V200R008C00 Version: V200R009C00 Version: V200R010C00 Version: S1700 V200R006C10 Version: S2700 V200R006C10 Version: V200R007C00 Version: S5700 V200R006C00 Version: S6700 V200R008C00 Version: S7700 V200R007C00 Version: S9700 V200R007C00 Version: Secospace USG6300 V500R001C00 Version: Secospace USG6500 V500R001C00 Version: Secospace USG6600 V500R001C00 Version: V500R001C30S Version: TE30 V100R001C02 Version: V100R001C10 Version: TE40 V500R002C00 Version: TE50 V500R002C00 Version: TE60 V100R001C01 Version: TP3106 V100R002C00 Version: TP3206 V100R002C00 Version: V100R002C10 Version: USG9500 V500R001C00 Version: ViewPoint 9030 V100R011C02 Version: V100R011C03 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.830Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00", }, { status: "affected", version: "IPS Module V500R001C00", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "NGFW Module V500R001C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "NIP6300 V500R001C00", }, { status: "affected", version: "NIP6600 V500R001C00", }, { status: "affected", version: "RP200 V500R002C00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "S12700 V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R009C00", }, { status: "affected", version: "V200R010C00", }, { status: "affected", version: "S1700 V200R006C10", }, { status: "affected", version: "S2700 V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "S5700 V200R006C00", }, { status: "affected", version: "S6700 V200R008C00", }, { status: "affected", version: "S7700 V200R007C00", }, { status: "affected", version: "S9700 V200R007C00", }, { status: "affected", version: "Secospace USG6300 V500R001C00", }, { status: "affected", version: "Secospace USG6500 V500R001C00", }, { status: "affected", version: "Secospace USG6600 V500R001C00", }, { status: "affected", version: "V500R001C30S", }, { status: "affected", version: "TE30 V100R001C02", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "TE40 V500R002C00", }, { status: "affected", version: "TE50 V500R002C00", }, { status: "affected", version: "TE60 V100R001C01", }, { status: "affected", version: "TP3106 V100R002C00", }, { status: "affected", version: "TP3206 V100R002C00", }, { status: "affected", version: "V100R002C10", }, { status: "affected", version: "USG9500 V500R001C00", }, { status: "affected", version: "ViewPoint 9030 V100R011C02", }, { status: "affected", version: "V100R011C03", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-05T18:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-12-06T00:00:00", ID: "CVE-2017-17138", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", version: { version_data: [ { version_value: "DP300 V500R002C00", }, { version_value: "IPS Module V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NGFW Module V500R001C00", }, { version_value: "V500R002C00", }, { version_value: "NIP6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NIP6600 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "RP200 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "S12700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S1700 V200R006C10", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S2700 V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S5700 V200R006C00", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S6700 V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S7700 V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S9700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "Secospace USG6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6600 V500R001C00", }, { version_value: "V500R001C30S", }, { version_value: "TE30 V100R001C02", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE40 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE50 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE60 V100R001C01", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TP3106 V100R002C00", }, { version_value: "TP3206 V100R002C00", }, { version_value: "V100R002C10", }, { version_value: "USG9500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "ViewPoint 9030 V100R011C02", }, { version_value: "V100R011C03", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PEM module of DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has a DoS vulnerability in PEM module of Huawei products due to insufficient verification. An authenticated local attacker can make processing into deadloop by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17138", datePublished: "2018-03-05T19:00:00Z", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-09-17T03:44:03.746Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1827 (GCVE-0-2020-1827)
Vulnerability from cvelistv5
Published
2020-02-17 20:38
Modified
2024-08-04 06:46
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00SPC100 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.916Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, { product: "Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T20:38:59", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1827", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, { product_name: "Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200212-02-ipsec-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1827", datePublished: "2020-02-17T20:38:59", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.916Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-19417 (GCVE-0-2019-19417)
Vulnerability from cvelistv5
Published
2020-07-08 16:53
Modified
2024-08-05 02:16
Severity ?
EPSS score ?
Summary
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | AR120-S |
Version: V200R006C10 Version: V200R007C00 Version: V200R008C20 V200R008C30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T02:16:47.230Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AR120-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20 V200R008C30", }, ], }, { product: "AR1200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR150-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10SPC300", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR160", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C16PWE", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR2200-S", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3200", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C11", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R008C10", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "AR3600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C20", }, ], }, { product: "AR510", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R006C12", }, { status: "affected", version: "V200R006C13", }, { status: "affected", version: "V200R006C15", }, { status: "affected", version: "V200R006C16", }, { status: "affected", version: "V200R006C17", }, { status: "affected", version: "V200R007C00SPC180T", }, { status: "affected", version: "V200R007C00SPC600", }, { status: "affected", version: "V200R007C00SPC900", }, { status: "affected", version: "V200R007C00SPCb00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "DP300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "IPS Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NGFW Module", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C10", }, ], }, { product: "NIP6300", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "NetEngine16EX", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "RSE6500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00", }, ], }, { product: "SMC2.0", vendor: "Huawei", versions: [ { status: "affected", version: "V100R003C00SPC200T", }, { status: "affected", version: "V100R003C00SPC300T", }, { status: "affected", version: "V100R003C00SPC301T", }, { status: "affected", version: "V100R003C10", }, { status: "affected", version: "V100R005C00SPC100", }, { status: "affected", version: "V100R005C00SPC101B001T", }, { status: "affected", version: "V100R005C00SPC102", }, { status: "affected", version: "V100R005C00SPC103", }, { status: "affected", version: "V100R005C00SPC200", }, { status: "affected", version: "V100R005C00SPC201T", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "SRG1300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG2300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R007C02", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SRG3300", vendor: "Huawei", versions: [ { status: "affected", version: "V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "V200R008C20", }, { status: "affected", version: "V200R008C30", }, ], }, { product: "SVN5600", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SVN5800-C", vendor: "Huawei", versions: [ { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C10", }, ], }, { product: "SeMG9811", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC500", }, { status: "affected", version: "V300R001C01SPC500T", }, { status: "affected", version: "V300R001C01SPC700", }, { status: "affected", version: "V300R001C01SPCa00", }, ], }, { product: "Secospace USG6300", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6500", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C00", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C20", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "SoftCo", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C01SPC300", }, { status: "affected", version: "V200R001C01SPC400", }, { status: "affected", version: "V200R001C01SPC500", }, { status: "affected", version: "V200R001C01SPC600", }, { status: "affected", version: "V200R001C01SPH703", }, { status: "affected", version: "V200R003C00SPC100", }, { status: "affected", version: "V200R003C00SPC200", }, { status: "affected", version: "V200R003C00SPC300", }, { status: "affected", version: "V200R003C00SPC500", }, { status: "affected", version: "V200R003C20", }, ], }, { product: "TE30", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C02SPC100", }, { status: "affected", version: "V100R001C02SPC200 V100R001C10", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE40", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE50", vendor: "Huawei", versions: [ { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, ], }, { product: "TE60", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC100", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "V100R001C10SPC300", }, { status: "affected", version: "V100R001C10SPC400", }, { status: "affected", version: "V100R001C10SPC500", }, { status: "affected", version: "V100R001C10SPC600", }, { status: "affected", version: "V100R001C10SPC800", }, { status: "affected", version: "V100R003C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "V500R002C00SPC100", }, { status: "affected", version: "V500R002C00SPC200", }, { status: "affected", version: "V500R002C00SPC300", }, { status: "affected", version: "V500R002C00SPC600", }, { status: "affected", version: "V500R002C00SPC700", }, { status: "affected", version: "V500R002C00SPC800", }, { status: "affected", version: "V500R002C00SPC900", }, { status: "affected", version: "V500R002C00SPCa00", }, { status: "affected", version: "V500R002C00SPCb00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "V600R006C00SPC200", }, ], }, { product: "TP3206", vendor: "Huawei", versions: [ { status: "affected", version: "V100R002C00", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01", }, { status: "affected", version: "V300R001C20", }, { status: "affected", version: "V500R001C00", }, { status: "affected", version: "V500R001C20", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C50", }, ], }, { product: "USG9520", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C01SPC800PWE", }, ], }, { product: "USG9560", vendor: "Huawei", versions: [ { status: "affected", version: "V300R001C20SPC300", }, ], }, { product: "VP9660", vendor: "Huawei", versions: [ { status: "affected", version: "V200R001C02SPC100", }, { status: "affected", version: "V200R001C02SPC200", }, { status: "affected", version: "V200R001C02SPC300", }, { status: "affected", version: "V200R001C02SPC300T", }, { status: "affected", version: "V200R001C02SPC400", }, { status: "affected", version: "V200R001C30SPC100", }, { status: "affected", version: "V200R001C30SPC100B015T", }, { status: "affected", version: "V200R001C30SPC101", }, { status: "affected", version: "V200R001C30SPC101TB015", }, { status: "affected", version: "V200R001C30SPC102T", }, { status: "affected", version: "V200R001C30SPC103T", }, { status: "affected", version: "V200R001C30SPC104T", }, { status: "affected", version: "V200R001C30SPC200", }, { status: "affected", version: "V200R001C30SPC200B022T", }, { status: "affected", version: "V200R001C30SPC201B023T", }, { status: "affected", version: "V200R001C30SPC202B025T", }, { status: "affected", version: "V200R001C30SPC203T", }, { status: "affected", version: "V200R001C30SPC206T", }, { status: "affected", version: "V200R001C30SPC207T", }, { status: "affected", version: "V200R001C30SPC208T", }, { status: "affected", version: "V200R001C30SPC209T", }, { status: "affected", version: "V200R001C30SPC300", }, { status: "affected", version: "V200R001C30SPC400", }, { status: "affected", version: "V200R001C30SPC400B001", }, { status: "affected", version: "V200R001C30SPC400T", }, { status: "affected", version: "V200R001C30SPC401T", }, { status: "affected", version: "V200R001C30SPC402T", }, { status: "affected", version: "V200R001C30SPC403T", }, { status: "affected", version: "V200R001C30SPC404T", }, { status: "affected", version: "V200R001C30SPC405T", }, { status: "affected", version: "V200R001C30SPC600", }, { status: "affected", version: "V200R001C30SPC700", }, { status: "affected", version: "V200R001C30SPC700T", }, { status: "affected", version: "V200R001C30SPC701T", }, { status: "affected", version: "V200R001C30SPC702T", }, { status: "affected", version: "V200R001C30SPC703T", }, { status: "affected", version: "V200R001C30SPC800", }, { status: "affected", version: "V200R001C30SPC800T", }, { status: "affected", version: "V200R001C30SPC900", }, { status: "affected", version: "V200R001C30SPCa00", }, { status: "affected", version: "V200R001C30SPCa00T", }, { status: "affected", version: "V200R001C30SPCa01", }, { status: "affected", version: "V200R001C30SPCa01T", }, { status: "affected", version: "V200R001C30SPCa02T", }, { status: "affected", version: "V200R001C30SPCb00", }, { status: "affected", version: "V200R001C30SPCc00", }, { status: "affected", version: "V200R001C30SPCd00", }, { status: "affected", version: "V200R001C30SPCd00T", }, { status: "affected", version: "V200R001C30SPCd01T", }, { status: "affected", version: "V200R001C30SPCd", }, ], }, { product: "ViewPoint 8660", vendor: "Huawei", versions: [ { status: "affected", version: "V100R008C03B013SP02", }, { status: "affected", version: "V100R008C03B013SP03", }, { status: "affected", version: "V100R008C03B013SP04", }, { status: "affected", version: "V100R008C03SPC100", }, { status: "affected", version: "V100R008C03SPC200", }, { status: "affected", version: "V100R008C03SPC300", }, { status: "affected", version: "V100R008C03SPC400", }, { status: "affected", version: "V100R008C03SPC500", }, { status: "affected", version: "V100R008C03SPC600", }, { status: "affected", version: "V100R008C03SPC700", }, { status: "affected", version: "V100R008C03SPC800", }, { status: "affected", version: "V100R008C03SPC900", }, { status: "affected", version: "V100R008C03SPCa00", }, { status: "affected", version: "V100R008C03SPCb00", }, { status: "affected", version: "V100R008C03SPCc00", }, ], }, { product: "ViewPoint 9030", vendor: "Huawei", versions: [ { status: "affected", version: "V100R011C02SPC100", }, { status: "affected", version: "V100R011C03B012SP15", }, { status: "affected", version: "V100R011C03B012SP16", }, { status: "affected", version: "V100R011C03B015SP03", }, { status: "affected", version: "V100R011C03LGWL01SPC100", }, { status: "affected", version: "V100R011C03LGWL01SPC100B012", }, { status: "affected", version: "V100R011C03SPC100", }, { status: "affected", version: "V100R011C03SPC200", }, { status: "affected", version: "V100R011C03SPC300", }, { status: "affected", version: "V100R011C03SPC400", }, { status: "affected", version: "V100R011C03SPC500", }, ], }, { product: "eSpace U1910", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1911", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1930", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1960", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500", }, { status: "affected", version: "V100R001C20LCRW01T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC600T", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1980", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C01SPC500T", }, { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500T", }, { status: "affected", version: "V100R001C20SPC502", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPH309", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, { product: "eSpace U1981", vendor: "Huawei", versions: [ { status: "affected", version: "V100R001C20SPC300", }, { status: "affected", version: "V100R001C20SPC400", }, { status: "affected", version: "V100R001C20SPC500", }, { status: "affected", version: "V100R001C20SPC600", }, { status: "affected", version: "V100R001C20SPC700", }, { status: "affected", version: "V100R001C20SPH702", }, { status: "affected", version: "V100R001C20SPH703", }, { status: "affected", version: "V100R001C30", }, { status: "affected", version: "V200R003C00", }, { status: "affected", version: "V200R003C20", }, { status: "affected", version: "V200R003C30", }, ], }, ], descriptions: [ { lang: "en", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], problemTypes: [ { descriptions: [ { description: "DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-08T16:53:05", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-19417", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AR120-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20 V200R008C30", }, ], }, }, { product_name: "AR1200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR150-S", version: { version_data: [ { version_value: "V200R006C10SPC300", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR160", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR2200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C13", }, { version_value: "V200R006C16PWE", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "AR2200-S", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3200", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C11", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R007C02", }, { version_value: "V200R008C00", }, { version_value: "V200R008C10", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "AR3600", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C20", }, ], }, }, { product_name: "AR510", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R006C12", }, { version_value: "V200R006C13", }, { version_value: "V200R006C15", }, { version_value: "V200R006C16", }, { version_value: "V200R006C17", }, { version_value: "V200R007C00SPC180T", }, { version_value: "V200R007C00SPC600", }, { version_value: "V200R007C00SPC900", }, { version_value: "V200R007C00SPCb00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "DP300", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "IPS Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NGFW Module", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R002C00", }, { version_value: "V500R002C10", }, ], }, }, { product_name: "NIP6300", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6600", version: { version_data: [ { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "NetEngine16EX", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "RSE6500", version: { version_data: [ { version_value: "V500R002C00", }, ], }, }, { product_name: "SMC2.0", version: { version_data: [ { version_value: "V100R003C00SPC200T", }, { version_value: "V100R003C00SPC300T", }, { version_value: "V100R003C00SPC301T", }, { version_value: "V100R003C10", }, { version_value: "V100R005C00SPC100", }, { version_value: "V100R005C00SPC101B001T", }, { version_value: "V100R005C00SPC102", }, { version_value: "V100R005C00SPC103", }, { version_value: "V100R005C00SPC200", }, { version_value: "V100R005C00SPC201T", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "SRG1300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG2300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R007C02", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SRG3300", version: { version_data: [ { version_value: "V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C20", }, { version_value: "V200R008C30", }, ], }, }, { product_name: "SVN5600", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SVN5800-C", version: { version_data: [ { version_value: "V200R003C00", }, { version_value: "V200R003C10", }, ], }, }, { product_name: "SeMG9811", version: { version_data: [ { version_value: "V300R001C01SPC500", }, { version_value: "V300R001C01SPC500T", }, { version_value: "V300R001C01SPC700", }, { version_value: "V300R001C01SPCa00", }, ], }, }, { product_name: "Secospace USG6300", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Secospace USG6500", version: { version_data: [ { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V100R001C00", }, { version_value: "V100R001C10", }, { version_value: "V100R001C20", }, { version_value: "V100R001C30", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "SoftCo", version: { version_data: [ { version_value: "V200R001C01SPC300", }, { version_value: "V200R001C01SPC400", }, { version_value: "V200R001C01SPC500", }, { version_value: "V200R001C01SPC600", }, { version_value: "V200R001C01SPH703", }, { version_value: "V200R003C00SPC100", }, { version_value: "V200R003C00SPC200", }, { version_value: "V200R003C00SPC300", }, { version_value: "V200R003C00SPC500", }, { version_value: "V200R003C20", }, ], }, }, { product_name: "TE30", version: { version_data: [ { version_value: "V100R001C02SPC100", }, { version_value: "V100R001C02SPC200 V100R001C10", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE40", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, { product_name: "TE50", version: { version_data: [ { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "TE60", version: { version_data: [ { version_value: "V100R001C01SPC100", }, { version_value: "V100R001C10", }, { version_value: "V100R001C10SPC300", }, { version_value: "V100R001C10SPC400", }, { version_value: "V100R001C10SPC500", }, { version_value: "V100R001C10SPC600", }, { version_value: "V100R001C10SPC800", }, { version_value: "V100R003C00", }, { version_value: "V500R002C00", }, { version_value: "V500R002C00SPC100", }, { version_value: "V500R002C00SPC200", }, { version_value: "V500R002C00SPC300", }, { version_value: "V500R002C00SPC600", }, { version_value: "V500R002C00SPC700", }, { version_value: "V500R002C00SPC800", }, { version_value: "V500R002C00SPC900", }, { version_value: "V500R002C00SPCa00", }, { version_value: "V500R002C00SPCb00", }, { version_value: "V600R006C00", }, { version_value: "V600R006C00SPC200", }, ], }, }, { product_name: "TP3206", version: { version_data: [ { version_value: "V100R002C00", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V300R001C01", }, { version_value: "V300R001C20", }, { version_value: "V500R001C00", }, { version_value: "V500R001C20", }, { version_value: "V500R001C30", }, { version_value: "V500R001C50", }, ], }, }, { product_name: "USG9520", version: { version_data: [ { version_value: "V300R001C01SPC800PWE", }, ], }, }, { product_name: "USG9560", version: { version_data: [ { version_value: "V300R001C20SPC300", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "VP9660", version: { version_data: [ { version_value: "V200R001C02SPC100", }, { version_value: "V200R001C02SPC200", }, { version_value: "V200R001C02SPC300", }, { version_value: "V200R001C02SPC300T", }, { version_value: "V200R001C02SPC400", }, { version_value: "V200R001C30SPC100", }, { version_value: "V200R001C30SPC100B015T", }, { version_value: "V200R001C30SPC101", }, { version_value: "V200R001C30SPC101TB015", }, { version_value: "V200R001C30SPC102T", }, { version_value: "V200R001C30SPC103T", }, { version_value: "V200R001C30SPC104T", }, { version_value: "V200R001C30SPC200", }, { version_value: "V200R001C30SPC200B022T", }, { version_value: "V200R001C30SPC201B023T", }, { version_value: "V200R001C30SPC202B025T", }, { version_value: "V200R001C30SPC203T", }, { version_value: "V200R001C30SPC206T", }, { version_value: "V200R001C30SPC207T", }, { version_value: "V200R001C30SPC208T", }, { version_value: "V200R001C30SPC209T", }, { version_value: "V200R001C30SPC300", }, { version_value: "V200R001C30SPC400", }, { version_value: "V200R001C30SPC400B001", }, { version_value: "V200R001C30SPC400T", }, { version_value: "V200R001C30SPC401T", }, { version_value: "V200R001C30SPC402T", }, { version_value: "V200R001C30SPC403T", }, { version_value: "V200R001C30SPC404T", }, { version_value: "V200R001C30SPC405T", }, { version_value: "V200R001C30SPC600", }, { version_value: "V200R001C30SPC700", }, { version_value: "V200R001C30SPC700T", }, { version_value: "V200R001C30SPC701T", }, { version_value: "V200R001C30SPC702T", }, { version_value: "V200R001C30SPC703T", }, { version_value: "V200R001C30SPC800", }, { version_value: "V200R001C30SPC800T", }, { version_value: "V200R001C30SPC900", }, { version_value: "V200R001C30SPCa00", }, { version_value: "V200R001C30SPCa00T", }, { version_value: "V200R001C30SPCa01", }, { version_value: "V200R001C30SPCa01T", }, { version_value: "V200R001C30SPCa02T", }, { version_value: "V200R001C30SPCb00", }, { version_value: "V200R001C30SPCc00", }, { version_value: "V200R001C30SPCd00", }, { version_value: "V200R001C30SPCd00T", }, { version_value: "V200R001C30SPCd01T", }, { version_value: "V200R001C30SPCd", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ViewPoint 8660", version: { version_data: [ { version_value: "V100R008C03B013SP02", }, { version_value: "V100R008C03B013SP03", }, { version_value: "V100R008C03B013SP04", }, { version_value: "V100R008C03SPC100", }, { version_value: "V100R008C03SPC200", }, { version_value: "V100R008C03SPC300", }, { version_value: "V100R008C03SPC400", }, { version_value: "V100R008C03SPC500", }, { version_value: "V100R008C03SPC600", }, { version_value: "V100R008C03SPC700", }, { version_value: "V100R008C03SPC800", }, { version_value: "V100R008C03SPC900", }, { version_value: "V100R008C03SPCa00", }, { version_value: "V100R008C03SPCb00", }, { version_value: "V100R008C03SPCc00", }, ], }, }, { product_name: "ViewPoint 9030", version: { version_data: [ { version_value: "V100R011C02SPC100", }, { version_value: "V100R011C03B012SP15", }, { version_value: "V100R011C03B012SP16", }, { version_value: "V100R011C03B015SP03", }, { version_value: "V100R011C03LGWL01SPC100", }, { version_value: "V100R011C03LGWL01SPC100B012", }, { version_value: "V100R011C03SPC100", }, { version_value: "V100R011C03SPC200", }, { version_value: "V100R011C03SPC300", }, { version_value: "V100R011C03SPC400", }, { version_value: "V100R011C03SPC500", }, ], }, }, { product_name: "eSpace U1910", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1911", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1930", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "eSpace U1960", version: { version_data: [ { version_value: "V100R001C01SPC500", }, { version_value: "V100R001C20LCRW01T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC600T", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1980", version: { version_data: [ { version_value: "V100R001C01SPC500T", }, { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500T", }, { version_value: "V100R001C20SPC502", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPH309", }, { version_value: "V100R001C20SPH703", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, { product_name: "eSpace U1981", version: { version_data: [ { version_value: "V100R001C20SPC300", }, { version_value: "V100R001C20SPC400", }, { version_value: "V100R001C20SPC500", }, { version_value: "V100R001C20SPC600", }, { version_value: "V100R001C20SPC700", }, { version_value: "V100R001C20SPH702", }, { version_value: "V100R001C20SPH703", }, { version_value: "V100R001C30", }, { version_value: "V200R003C00", }, { version_value: "V200R003C20", }, { version_value: "V200R003C30", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-19417", datePublished: "2020-07-08T16:53:05", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-05T02:16:47.230Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1857 (GCVE-0-2020-1857)
Vulnerability from cvelistv5
Published
2020-02-17 20:01
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | NIP6800 |
Version: V500R001C30 Version: V500R001C60SPC500 Version: V500R005C00SPC100 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.616Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NIP6800", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, { product: "Secospace USG6600", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, { product: "USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30SPC200", }, { status: "affected", version: "V500R001C30SPC600", }, { status: "affected", version: "V500R001C60SPC500", }, { status: "affected", version: "V500R005C00SPC100", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.", }, ], problemTypes: [ { descriptions: [ { description: "Information leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T20:01:03", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1857", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NIP6800", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, { product_name: "Secospace USG6600", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, { product_name: "USG9500", version: { version_data: [ { version_value: "V500R001C30SPC200", }, { version_value: "V500R001C30SPC600", }, { version_value: "V500R001C60SPC500", }, { version_value: "V500R005C00SPC100", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information leakage", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-leakage-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1857", datePublished: "2020-02-17T20:01:03", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.616Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22411 (GCVE-0-2021-22411)
Vulnerability from cvelistv5
Published
2021-05-27 12:12
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500 |
Version: V500R005C00SPC100,V500R005C00SPC200 Version: V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200 Version: V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:44:13.310Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", vendor: "n/a", versions: [ { status: "affected", version: "V500R005C00SPC100,V500R005C00SPC200", }, { status: "affected", version: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { status: "affected", version: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, ], descriptions: [ { lang: "en", value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.", }, ], problemTypes: [ { descriptions: [ { description: "Out-of-Bounds Write", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-05-27T12:12:55", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22411", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NGFW Module;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG9500", version: { version_data: [ { version_value: "V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, { version_value: "V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of the module.Affected product versions include: NGFW Module versions V500R005C00SPC100,V500R005C00SPC200;Secospace USG6300 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6500 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200;USG9500 versions V500R001C60SPC500,V500R005C00SPC100,V500R005C00SPC200.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out-of-Bounds Write", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210506-02-outofbounds-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22411", datePublished: "2021-05-27T12:12:55", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:44:13.310Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-22309 (GCVE-0-2021-22309)
Vulnerability from cvelistv5
Published
2021-03-22 17:42
Modified
2024-08-03 18:37
Severity ?
EPSS score ?
Summary
There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | USG9500,USG9520,USG9560,USG9580 |
Version: V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200 Version: V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T18:37:18.480Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "USG9500,USG9520,USG9560,USG9580", vendor: "n/a", versions: [ { status: "affected", version: "V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.", }, ], problemTypes: [ { descriptions: [ { description: "Information Leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-22T17:42:50", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2021-22309", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "USG9500,USG9520,USG9560,USG9580", version: { version_data: [ { version_value: "V500R001C30SPC200,V500R001C60SPC500,V500R005C00SPC200", }, { version_value: "V500R005C00", }, { version_value: "V500R005C00", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There is insecure algorithm vulnerability in Huawei products. A module uses less random input in a secure mechanism. Attackers can exploit this vulnerability by brute forcing to obtain sensitive message. This can lead to information leak. Affected product versions include:USG9500 versions V500R001C30SPC200, V500R001C60SPC500,V500R005C00SPC200;USG9520 versions V500R005C00;USG9560 versions V500R005C00;USG9580 versions V500R005C00.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leakage", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210202-01-fw-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2021-22309", datePublished: "2021-03-22T17:42:50", dateReserved: "2021-01-05T00:00:00", dateUpdated: "2024-08-03T18:37:18.480Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-1856 (GCVE-0-2020-1856)
Vulnerability from cvelistv5
Published
2020-02-17 20:27
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei | NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500 |
Version: V500R001C30 Version: V500R001C60 Version: V500R005C00 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:58.787Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500", vendor: "Huawei", versions: [ { status: "affected", version: "V500R001C30", }, { status: "affected", version: "V500R001C60", }, { status: "affected", version: "V500R005C00", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, ], problemTypes: [ { descriptions: [ { description: "Information leakage", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T20:27:50", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1856", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, USG9500", version: { version_data: [ { version_value: "V500R001C30", }, { version_value: "V500R001C60", }, { version_value: "V500R005C00", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei NGFW Module, NIP6300, NIP6600, Secospace USG6500, Secospace USG6600, and USG9500 versions V500R001C30, V500R001C60, and V500R005C00 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information leakage", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200205-01-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1856", datePublished: "2020-02-17T20:27:50", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:58.787Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17137 (GCVE-0-2017-17137)
Vulnerability from cvelistv5
Published
2018-03-05 19:00
Modified
2024-09-17 00:42
Severity ?
EPSS score ?
Summary
PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030 |
Version: DP300 V500R002C00 Version: IPS Module V500R001C00 Version: V500R001C30 Version: NGFW Module V500R001C00 Version: V500R002C00 Version: NIP6300 V500R001C00 Version: NIP6600 V500R001C00 Version: RP200 V500R002C00 Version: V600R006C00 Version: S12700 V200R007C00 Version: V200R007C01 Version: V200R008C00 Version: V200R009C00 Version: V200R010C00 Version: S1700 V200R006C10 Version: S2700 V200R006C10 Version: V200R007C00 Version: S5700 V200R006C00 Version: S6700 V200R008C00 Version: S7700 V200R007C00 Version: S9700 V200R007C00 Version: Secospace USG6300 V500R001C00 Version: Secospace USG6500 V500R001C00 Version: Secospace USG6600 V500R001C00 Version: V500R001C30S Version: TE30 V100R001C02 Version: V100R001C10 Version: TE40 V500R002C00 Version: TE50 V500R002C00 Version: TE60 V100R001C01 Version: TP3106 V100R002C00 Version: TP3206 V100R002C00 Version: V100R002C10 Version: USG9500 V500R001C00 Version: ViewPoint 9030 V100R011C02 Version: V100R011C03 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.902Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "DP300 V500R002C00", }, { status: "affected", version: "IPS Module V500R001C00", }, { status: "affected", version: "V500R001C30", }, { status: "affected", version: "NGFW Module V500R001C00", }, { status: "affected", version: "V500R002C00", }, { status: "affected", version: "NIP6300 V500R001C00", }, { status: "affected", version: "NIP6600 V500R001C00", }, { status: "affected", version: "RP200 V500R002C00", }, { status: "affected", version: "V600R006C00", }, { status: "affected", version: "S12700 V200R007C00", }, { status: "affected", version: "V200R007C01", }, { status: "affected", version: "V200R008C00", }, { status: "affected", version: "V200R009C00", }, { status: "affected", version: "V200R010C00", }, { status: "affected", version: "S1700 V200R006C10", }, { status: "affected", version: "S2700 V200R006C10", }, { status: "affected", version: "V200R007C00", }, { status: "affected", version: "S5700 V200R006C00", }, { status: "affected", version: "S6700 V200R008C00", }, { status: "affected", version: "S7700 V200R007C00", }, { status: "affected", version: "S9700 V200R007C00", }, { status: "affected", version: "Secospace USG6300 V500R001C00", }, { status: "affected", version: "Secospace USG6500 V500R001C00", }, { status: "affected", version: "Secospace USG6600 V500R001C00", }, { status: "affected", version: "V500R001C30S", }, { status: "affected", version: "TE30 V100R001C02", }, { status: "affected", version: "V100R001C10", }, { status: "affected", version: "TE40 V500R002C00", }, { status: "affected", version: "TE50 V500R002C00", }, { status: "affected", version: "TE60 V100R001C01", }, { status: "affected", version: "TP3106 V100R002C00", }, { status: "affected", version: "TP3206 V100R002C00", }, { status: "affected", version: "V100R002C10", }, { status: "affected", version: "USG9500 V500R001C00", }, { status: "affected", version: "ViewPoint 9030 V100R011C02", }, { status: "affected", version: "V100R011C03", }, ], }, ], datePublic: "2017-12-06T00:00:00", descriptions: [ { lang: "en", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "Out-of-Bounds memory access", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-05T18:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", DATE_PUBLIC: "2017-12-06T00:00:00", ID: "CVE-2017-17137", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "DP300; IPS Module; NGFW Module; NIP6300; NIP6600; RP200; S12700; S1700; S2700; S5700; S6700; S7700; S9700; Secospace USG6300; Secospace USG6500; Secospace USG6600; TE30; TE40; TE50; TE60; TP3106; TP3206; USG9500; ViewPoint 9030", version: { version_data: [ { version_value: "DP300 V500R002C00", }, { version_value: "IPS Module V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NGFW Module V500R001C00", }, { version_value: "V500R002C00", }, { version_value: "NIP6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "NIP6600 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "RP200 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "S12700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S1700 V200R006C10", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S2700 V200R006C10", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S5700 V200R006C00", }, { version_value: "V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S6700 V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S7700 V200R007C00", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "S9700 V200R007C00", }, { version_value: "V200R007C01", }, { version_value: "V200R008C00", }, { version_value: "V200R009C00", }, { version_value: "V200R010C00", }, { version_value: "Secospace USG6300 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "Secospace USG6600 V500R001C00", }, { version_value: "V500R001C30S", }, { version_value: "TE30 V100R001C02", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE40 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE50 V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TE60 V100R001C01", }, { version_value: "V100R001C10", }, { version_value: "V500R002C00", }, { version_value: "V600R006C00", }, { version_value: "TP3106 V100R002C00", }, { version_value: "TP3206 V100R002C00", }, { version_value: "V100R002C10", }, { version_value: "USG9500 V500R001C00", }, { version_value: "V500R001C30", }, { version_value: "ViewPoint 9030 V100R011C02", }, { version_value: "V100R011C03", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "PEM module of Huawei DP300 V500R002C00; IPS Module V500R001C00; V500R001C30; NGFW Module V500R001C00; V500R002C00; NIP6300 V500R001C00; V500R001C30; NIP6600 V500R001C00; V500R001C30; RP200 V500R002C00; V600R006C00; S12700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; S1700 V200R006C10; V200R009C00; V200R010C00; S2700 V200R006C10; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S5700 V200R006C00; V200R007C00; V200R008C00; V200R009C00; V200R010C00; S6700 V200R008C00; V200R009C00; V200R010C00; S7700 V200R007C00; V200R008C00; V200R009C00; V200R010C00; S9700 V200R007C00; V200R007C01; V200R008C00; V200R009C00; V200R010C00; Secospace USG6300 V500R001C00; V500R001C30; Secospace USG6500 V500R001C00; V500R001C30; Secospace USG6600 V500R001C00; V500R001C30S; TE30 V100R001C02; V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C01; V100R001C10; V500R002C00; V600R006C00; TP3106 V100R002C00; TP3206 V100R002C00; V100R002C10; USG9500 V500R001C00; V500R001C30; ViewPoint 9030 V100R011C02; V100R011C03 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by a malicious certificate. The attacker can exploit this vulnerability to cause a denial of service.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Out-of-Bounds memory access", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-01-pem-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17137", datePublished: "2018-03-05T19:00:00Z", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-09-17T00:42:09.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-17162 (GCVE-0-2017-17162)
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500 |
Version: Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:43:59.917Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300", }, ], }, ], datePublic: "2017-12-13T00:00:00", descriptions: [ { lang: "en", value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, ], problemTypes: [ { descriptions: [ { description: "memory leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-15T15:57:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2017-17162", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Secospace USG6600, Secospace USG6600, Secospace USG6600, USG9500, USG9500, USG9500", version: { version_data: [ { version_value: "Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don't be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "memory leak", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20171213-02-firewall-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2017-17162", datePublished: "2018-02-15T16:00:00", dateReserved: "2017-12-04T00:00:00", dateUpdated: "2024-08-05T20:43:59.917Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }