Vulnerabilites related to huawei - ws5800-10
var-202005-0971
Vulnerability from variot

There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China's Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0971",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "marie-l21bx \u003c=10.0.0.188",
        "scope": null,
        "trust": 1.2,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "lelandp-l22a",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.166\\(c675e5r1p4t8\\)"
      },
      {
        "model": "anne-al00",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.1.0.331\\(c675e9r1p3t8\\)"
      },
      {
        "model": "honor 10 lite",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.0.182\\(c675e17r2p2\\)"
      },
      {
        "model": "ws5200-16",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd18-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "ws6500-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "e6878-370",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.1\\(h610sp10c00\\)"
      },
      {
        "model": "cd18-16",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd17-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "ws5200-17",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.23"
      },
      {
        "model": "columbia-tl00b",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "9.0.0.187\\(c01e181r1p20t8\\)"
      },
      {
        "model": "cd16-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "ws5200-11",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "ws5200-11",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.23"
      },
      {
        "model": "tc5200-16",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd17-16",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "ws6500-16",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "berkeley-l09",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.1.1\\(c675r1\\)"
      },
      {
        "model": "ws5800-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.3.27"
      },
      {
        "model": "anne-al00",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.1.0.331(c675e9r1p3t8)"
      },
      {
        "model": "berkeley-l09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.1.1(c675r1)"
      },
      {
        "model": "cd16-10",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd17-10",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd17-16",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd18-10",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "cd18-16",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.2.8"
      },
      {
        "model": "columbia-tl00b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.0.187(c01e181r1p20t8)"
      },
      {
        "model": "e6878-370",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "10.0.5.1(h610sp10c00)"
      },
      {
        "model": "honor 10 lite",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "9.0.1.113(c675e11r1p12)"
      },
      {
        "model": "anne-al00 \u003c=9.1.0.331",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "berkeley-l09 \u003c=10.0.1.1",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "cd16-10",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "cd17-10",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "cd17-16",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "cd18-10",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "cd18-16",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "columbia-tl00b \u003c=9.0.0.187",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "e6878-370 \u003c=10.0.5.1",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p30 lite \u003c=10.0.0.185",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "p30 lite \u003c=10.0.0.197",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "nova 4e \u003c=10.0.0.158",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "honor lite 9.0.1.113",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10"
      },
      {
        "model": "lelandp-l22a \u003c=9.1.0.166",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "marie-al00ax \u003c=10.0.0.158",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "marie-al00bx \u003c=10.0.0.158",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "marie-l22bx \u003c=10.0.0.188",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "marie-l23bx \u003c=10.0.0.188",
        "scope": null,
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "tc5200-16",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "ws5200-11",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "ws5200-12",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.23"
      },
      {
        "model": "ws5200-16",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "ws5200-17",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.23"
      },
      {
        "model": "ws5800-10",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.3.27"
      },
      {
        "model": "ws6500-10",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      },
      {
        "model": "ws6500-16",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "\u003c=10.0.2.8"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.1.1\\(c675r1\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.23",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.23",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.3.27",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.8",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      }
    ]
  },
  "cve": "CVE-2020-9069",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005593",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2020-36726",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005593",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-9069",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-005593",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-36726",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202005-1099",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China\u0027s Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-9069",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "id": "VAR-202005-0971",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      }
    ],
    "trust": 1.3640656644
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:12:58.319000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200520-01-leakage",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
      },
      {
        "title": "Patch for Multiple Huawei product information disclosure vulnerabilities (CNVD-2020-36726)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/224779"
      },
      {
        "title": "Multiple Huawei Product information disclosure vulnerability repair measures",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119391"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-200",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9069"
      },
      {
        "trust": 1.6,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9069"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200520-01-leakage-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "date": "2020-06-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "date": "2020-05-21T15:15:10.123000",
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "date": "2020-05-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-07-07T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-36726"
      },
      {
        "date": "2020-06-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      },
      {
        "date": "2021-07-21T11:39:23.747000",
        "db": "NVD",
        "id": "CVE-2020-9069"
      },
      {
        "date": "2020-07-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Information leakage vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005593"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202005-1099"
      }
    ],
    "trust": 0.6
  }
}

var-202010-1178
Vulnerability from variot

Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China's Huawei (Huawei) company

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1178",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ws7200-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.21"
      },
      {
        "model": "ws5281-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.32"
      },
      {
        "model": "ws5200-12",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.1.9"
      },
      {
        "model": "hirouter-ct31-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.37"
      },
      {
        "model": "hirouter-cd30-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.7"
      },
      {
        "model": "ws5800-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.3.33"
      },
      {
        "model": "ws7100-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.37"
      },
      {
        "model": "ws5800-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.3.25"
      },
      {
        "model": "ws5281-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.10"
      },
      {
        "model": "hirouter-cd30-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.5"
      },
      {
        "model": "hirouter-ct31-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.2.20"
      },
      {
        "model": "ws7200-10",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.37"
      },
      {
        "model": "ws5200-12",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.6"
      },
      {
        "model": "ws7100-10",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "10.0.5.21"
      },
      {
        "model": "hirouter-cd30-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "hirouter-ct31-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws5200-12",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws5281-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws5800-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws7100-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws7200-10",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "hirouter-ct31-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.2.20"
      },
      {
        "model": "ws5800-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.3.25"
      },
      {
        "model": "hirouter-cd30-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.2.5"
      },
      {
        "model": "ws5200-12",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.1.9"
      },
      {
        "model": "ws5281-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.5.10"
      },
      {
        "model": "ws7100-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.5.21"
      },
      {
        "model": "ws7200-10",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "10.0.5.21"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.5.7",
                    "versionStartIncluding": "10.0.2.5",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.2.37",
                    "versionStartIncluding": "10.0.2.20",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "10.0.5.6",
                    "versionStartIncluding": "10.0.1.9",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.5.32",
                    "versionStartIncluding": "10.0.5.10",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.3.33",
                    "versionStartIncluding": "10.0.3.25",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.5.37",
                    "versionStartIncluding": "10.0.5.21",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "10.0.5.37",
                    "versionStartIncluding": "10.0.5.21",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      }
    ]
  },
  "cve": "CVE-2020-9122",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 3.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-9122",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2020-68353",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-9122",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-9122",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-68353",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202009-1682",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-9122",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China\u0027s Huawei (Huawei) company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-9122",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "id": "VAR-202010-1178",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      }
    ],
    "trust": 1.2815476428571428
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:47:21.525000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200930-01-verification",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
      },
      {
        "title": "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-68353)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/241531"
      },
      {
        "title": "HUAWEI Glory routing Pro 2 Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131161"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.0
      },
      {
        "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9122"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-verification-cn"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189273"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "date": "2020-10-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "date": "2021-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "date": "2020-10-12T14:15:14.387000",
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "date": "2020-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-02T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-68353"
      },
      {
        "date": "2020-10-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9122"
      },
      {
        "date": "2021-04-26T07:54:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      },
      {
        "date": "2020-10-16T15:42:46.857000",
        "db": "NVD",
        "id": "CVE-2020-9122"
      },
      {
        "date": "2021-08-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012148"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1682"
      }
    ],
    "trust": 0.6
  }
}

var-202010-1166
Vulnerability from variot

WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal. WS5800-10 Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state. Huawei ws5800-10 is a wireless router of China's Huawei (Huawei) company.

Some Huawei home routers have security vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1166",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ws5800-10",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "10.0.3.25"
      },
      {
        "model": "ws5800-10",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ws5800-10",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "ws5800-10  firmware  10.0.3.25"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:10.0.3.25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      }
    ]
  },
  "cve": "CVE-2020-9230",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 3.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-9230",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2020-60324",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-9230",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-9230",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-60324",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202009-1699",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-9230",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal. WS5800-10 Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state. Huawei ws5800-10 is a wireless router of China\u0027s Huawei (Huawei) company. \n\r\n\r\nSome Huawei home routers have security vulnerabilities",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-9230",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "id": "VAR-202010-1166",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      }
    ],
    "trust": 1.2875
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      }
    ]
  },
  "last_update_date": "2023-12-18T14:00:21.677000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20200930-01-homerouter",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
      },
      {
        "title": "Patch for HUAWEI ws5800-10 data forgery issue vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/238405"
      },
      {
        "title": "HUAWEI ws5800-10 Repair measures for data forgery problem vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131167"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-345",
        "trust": 1.0
      },
      {
        "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9230"
      },
      {
        "trust": 1.7,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
      },
      {
        "trust": 0.6,
        "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-homerouter-cn"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/345.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189255"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-11-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "date": "2020-10-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "date": "2021-04-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "date": "2020-10-12T14:15:14.497000",
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "date": "2020-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-11-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-60324"
      },
      {
        "date": "2020-10-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-9230"
      },
      {
        "date": "2021-04-26T07:54:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      },
      {
        "date": "2020-10-16T13:52:28.950000",
        "db": "NVD",
        "id": "CVE-2020-9230"
      },
      {
        "date": "2021-07-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "WS5800-10\u00a0 Vulnerability for inadequate validation of data reliability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012149"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "data forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-1699"
      }
    ],
    "trust": 0.6
  }
}

cve-2020-9069
Vulnerability from cvelistv5
Published
2020-05-21 14:19
Modified
2024-08-04 10:19
Severity ?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
Impacted products
Vendor Product Version
HUAWEI Anne-AL00 Version: earlier than 9.1.0.331(C675E9R1P3T8)
HUAWEI Berkeley-L09 Version: earlier than 10.0.1.1(C675R1)
HUAWEI CD16-10 Version: earlier than 10.0.2.8
HUAWEI CD17-10 Version: earlier than 10.0.2.8
HUAWEI CD17-16 Version: earlier than 10.0.2.8
HUAWEI CD18-10 Version: earlier than 10.0.2.8
HUAWEI CD18-16 Version: earlier than 10.0.2.8
HUAWEI Columbia-TL00B Version: earlier than 9.0.0.187(C01E181R1P20T8)
HUAWEI E6878-370 Version: earlier than 10.0.5.1(H610SP10C00)
HUAWEI HUAWEI P30 lite Version: earlier than 10.0.0.185(C605E3R1P3)
Version: earlier than 10.0.0.197(C432E8R2P7)
HUAWEI HUAWEI nova 4e Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Honor 10 Lite Version: 9.0.1.113(C675E11R1P12)
HUAWEI LelandP-L22A Version: earlier than 9.1.0.166(C675E5R1P4T8)
HUAWEI Marie-AL00AX Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-AL00AY Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-AL00BX Version: earlier than 10.0.0.158(C00E64R1P9)
HUAWEI Marie-L03BX Version: earlier than 10.0.0.188(C605E5R1P1)
HUAWEI Marie-L21BX Version: earlier than 10.0.0.188(C432E4R4P1)
Version: earlier than 10.0.0.188(C461E5R3P1)
HUAWEI Marie-L22BX Version: earlier than 10.0.0.188(C636E3R3P1)
HUAWEI Marie-L23BX Version: earlier than 10.0.0.188(C605E5R1P1)
HUAWEI TC5200-16 Version: earlier than 10.0.2.8
HUAWEI WS5200-11 Version: earlier than 10.0.2.8
HUAWEI WS5200-12 Version: earlier than 10.0.2.23
HUAWEI WS5200-16 Version: earlier than 10.0.2.8
HUAWEI WS5200-17 Version: earlier than 10.0.2.23
HUAWEI WS5800-10 Version: earlier than 10.0.3.27
HUAWEI WS6500-10 Version: earlier than 10.0.2.8
HUAWEI WS6500-16 Version: earlier than 10.0.2.8
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:19.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Anne-AL00",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.331(C675E9R1P3T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.1.1(C675R1)"
            }
          ]
        },
        {
          "product": "CD16-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "Columbia-TL00B",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.187(C01E181R1P20T8)"
            }
          ]
        },
        {
          "product": "E6878-370",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.5.1(H610SP10C00)"
            }
          ]
        },
        {
          "product": "HUAWEI P30 lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.185(C605E3R1P3)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.197(C432E8R2P7)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 4e",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.1.113(C675E11R1P12)"
            }
          ]
        },
        {
          "product": "LelandP-L22A",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.166(C675E5R1P4T8)"
            }
          ]
        },
        {
          "product": "Marie-AL00AX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00AY",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-L03BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "Marie-L21BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C432E4R4P1)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C461E5R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L22BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C636E3R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L23BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "TC5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-11",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-12",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-17",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5800-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.3.27"
            }
          ]
        },
        {
          "product": "WS6500-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS6500-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leakage",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-29T22:23:46",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9069",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.1.1(C675R1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD16-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-TL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.5.1(H610SP10C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.185(C605E3R1P3)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.197(C432E8R2P7)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 4e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "9.0.1.113(C675E11R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LelandP-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AY",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L03BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L21BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C432E4R4P1)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.188(C461E5R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L22BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C636E3R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L23BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TC5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-12",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-17",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5800-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.3.27"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "HUAWEI"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leakage"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9069",
    "datePublished": "2020-05-21T14:19:31",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:19.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-9122
Vulnerability from cvelistv5
Published
2020-10-12 13:37
Modified
2024-08-04 10:19
Severity ?
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.
Impacted products
Vendor Product Version
n/a HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 Version: 10.0.2.5
Version: 10.0.2.20
Version: 10.0.1.9
Version: 10.0.5.10
Version: 10.0.3.25
Version: 10.0.5.21
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:20.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.2.5"
            },
            {
              "status": "affected",
              "version": "10.0.2.20"
            },
            {
              "status": "affected",
              "version": "10.0.1.9"
            },
            {
              "status": "affected",
              "version": "10.0.5.10"
            },
            {
              "status": "affected",
              "version": "10.0.3.25"
            },
            {
              "status": "affected",
              "version": "10.0.5.21"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Insufficient Input Verification",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-12T13:37:31",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9122",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.2.5"
                          },
                          {
                            "version_value": "10.0.2.20"
                          },
                          {
                            "version_value": "10.0.1.9"
                          },
                          {
                            "version_value": "10.0.5.10"
                          },
                          {
                            "version_value": "10.0.3.25"
                          },
                          {
                            "version_value": "10.0.5.21"
                          },
                          {
                            "version_value": "10.0.5.21"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Insufficient Input Verification"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9122",
    "datePublished": "2020-10-12T13:37:31",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:20.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-9230
Vulnerability from cvelistv5
Published
2020-10-12 13:25
Modified
2024-08-04 10:19
Severity ?
Summary
WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal.
Impacted products
Vendor Product Version
n/a WS5800-10 Version: 10.0.3.25
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:20.119Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WS5800-10",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.3.25"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-12T13:25:11",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9230",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WS5800-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.3.25"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9230",
    "datePublished": "2020-10-12T13:25:11",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:20.119Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-10-12 14:15
Modified
2024-11-21 05:40
Summary
WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal.
Impacted products
Vendor Product Version
huawei ws5800-10_firmware 10.0.3.25
huawei ws5800-10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:10.0.3.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "73057F79-DC07-427F-9F1E-4C3CFF34C60C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal."
    },
    {
      "lang": "es",
      "value": "El Dispositivo WS5800-10 versi\u00f3n 10.0.3.25, presenta una vulnerabilidad de denegaci\u00f3n de servicio.\u0026#xa0;Debido a la verificaci\u00f3n incorrecta de un mensaje espec\u00edfico, un atacante puede explotar esta vulnerabilidad para causar que una funci\u00f3n espec\u00edfica se vuelva anormal"
    }
  ],
  "id": "CVE-2020-9230",
  "lastModified": "2024-11-21T05:40:12.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-12T14:15:14.497",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-345"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-21 15:15
Modified
2024-11-21 05:39
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61FF27C-1D5A-414C-88BE-A4E1567D57E3",
              "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7BA6CC3-74ED-4936-B5F3-09AE0942D7F1",
              "versionEndExcluding": "10.0.1.1\\(c675r1\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E7A9EC-D51E-4E00-9E20-397405DD405E",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1259623C-9765-4A03-B984-71BC23832EA5",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5021FFF9-39E9-4392-8F7B-77C99AD9021B",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "192D571A-3612-48FF-AD58-F85C05109DB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99350875-103C-4E3D-A3F1-CB51A3F04CAB",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "541F6EEE-365C-4317-BE40-5D1780023B37",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "272588E3-15DA-48C5-B5EA-E53D981294B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78009F5F-1CC7-41D5-B3D7-DFDD6888CF98",
              "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A597E29-2CFE-4D6F-8141-D0A8A04C7BF9",
              "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01770930-E2A3-4759-8367-4DAA53046B20",
              "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93DD848A-F0E2-4064-BB74-9FC5C82157AB",
              "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BE98F19-5883-4C1F-892E-4AEF2DB7EDB0",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "392304B7-F9CD-44B4-88FB-353A650DB700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01371306-680F-4007-8E5A-865C67D657E5",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FA3F67-7545-444D-BCCB-133B6680F3A7",
              "versionEndExcluding": "10.0.2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D3BD34-4095-4730-995D-5731A0BB8BF9",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E7101C-170D-4EA2-96A7-410AE55137BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D525C1-B8A9-422B-A315-73BF6D4DEF7B",
              "versionEndExcluding": "10.0.2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71EAA19C-B250-4809-BE4A-4575D5F793A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "738EA159-65D7-42FE-B29F-1890F93A1A5D",
              "versionEndExcluding": "10.0.3.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDF3E0C-594B-48BF-8E9F-4A10A11D5449",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0571923-C1D0-4F06-AD1E-9D43F5290B74",
              "versionEndExcluding": "10.0.2.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B611DA7B-A2E3-44A3-BC8B-C43308EF3E2B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
    },
    {
      "lang": "es",
      "value": "Hay una vulnerabilidad de filtrado de informaci\u00f3n en algunos productos Huawei. Un atacante adyacente no autenticado podr\u00eda explotar esta vulnerabilidad para descifrar datos. Las versiones de producto afectadas incluyen: Anne-AL00 Versiones anteriores a la versi\u00f3n 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versiones anteriores a la versi\u00f3n 10.0.1.1(C675R1); CD16-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-10 Versiones anteriores a la versi\u00f3n  10.0.2.8; CD17-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-16  Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.han 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versiones anteriores a la versi\u00f3n 10.0.0.185(C605E3R1P3), Versiones anteriores a la versi\u00f3n 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versiones anteriores a la versi\u00f3n 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00AY Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00BX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-L03BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); Marie-L21BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C432E4R4P1), V 10.0.0.188(C461E5R3P1); Marie-L22BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C636E3R3P1); Marie-L23BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); TC5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-11 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-12 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-17 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5800-10 Versiones anteriores a la versi\u00f3n 10.0.3.27; WS6500-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS6500-16 Versiones anteriores a la versi\u00f3n 10.0.2.8"
    }
  ],
  "id": "CVE-2020-9069",
  "lastModified": "2024-11-21T05:39:57.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-21T15:15:10.123",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-10-12 14:15
Modified
2024-11-21 05:40
Summary
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DAB41B-30DC-4621-9AF0-D60EAB48511B",
              "versionEndExcluding": "10.0.5.7",
              "versionStartIncluding": "10.0.2.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B841D5-A00F-4A94-B90D-3183C33429FB",
              "versionEndExcluding": "10.0.2.37",
              "versionStartIncluding": "10.0.2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD8A7CD-6AF2-4681-9DED-1A225623FC18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACB670B-E1DC-4734-9683-D3A732F61A54",
              "versionEndIncluding": "10.0.5.6",
              "versionStartIncluding": "10.0.1.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DE8454-E98B-4AA4-97A9-61DC3BB0E4B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6855ED3B-FD30-4A51-B748-68A21DDD183D",
              "versionEndExcluding": "10.0.5.32",
              "versionStartIncluding": "10.0.5.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A157FDA-330F-4DF0-AF48-8570B4734D62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FE6EB21-4CBC-4E98-BC81-05A298941727",
              "versionEndExcluding": "10.0.3.33",
              "versionStartIncluding": "10.0.3.25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F83A176-A2F9-478C-BFA3-1A637095E88B",
              "versionEndExcluding": "10.0.5.37",
              "versionStartIncluding": "10.0.5.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "990433C4-F54F-4B50-8972-68F1CF485E1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "923DA700-265A-4099-BC3D-E5A44A1D747F",
              "versionEndExcluding": "10.0.5.37",
              "versionStartIncluding": "10.0.5.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21."
    },
    {
      "lang": "es",
      "value": "Algunos productos Huawei presentan una vulnerabilidad de verificaci\u00f3n de entrada insuficiente.\u0026#xa0;Los atacantes pueden explotar esta vulnerabilidad en la LAN para causar un servicio anormal en los dispositivos afectados. Las versiones de productos afectados incluyen: HiRouter-CD30-10 versi\u00f3n 10.0.2.5; HiRouter-CT31-10 versi\u00f3n 10.0.2.20; WS5200-12 versi\u00f3n 10.0.1.9; WS5281 -10 versi\u00f3n 10.0.5.10; WS5800-10 versi\u00f3n 10.0.3.25; WS7100-10 versi\u00f3n 10.0.5.21; WS7200-10 versi\u00f3n 10.0.5.21"
    }
  ],
  "id": "CVE-2020-9122",
  "lastModified": "2024-11-21T05:40:05.620",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-12T14:15:14.387",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}