Vulnerabilites related to huawei - ws5800-10
var-202005-0971
Vulnerability from variot
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China's Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "marie-l21bx \u003c=10.0.0.188", "scope": null, "trust": 1.2, "vendor": "huawei", "version": null }, { "model": "lelandp-l22a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.166\\(c675e5r1p4t8\\)" }, { "model": "anne-al00", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.331\\(c675e9r1p3t8\\)" }, { "model": "honor 10 lite", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.182\\(c675e17r2p2\\)" }, { "model": "ws5200-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws6500-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "e6878-370", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.1\\(h610sp10c00\\)" }, { "model": "cd18-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws5200-17", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.23" }, { "model": "columbia-tl00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.0.0.187\\(c01e181r1p20t8\\)" }, { "model": "cd16-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws5200-11", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws5200-11", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.23" }, { "model": "tc5200-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws6500-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "berkeley-l09", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.1.1\\(c675r1\\)" }, { "model": "ws5800-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.27" }, { "model": "anne-al00", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.1.0.331(c675e9r1p3t8)" }, { "model": "berkeley-l09", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.1.1(c675r1)" }, { "model": "cd16-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-16", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-16", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "columbia-tl00b", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.0.0.187(c01e181r1p20t8)" }, { "model": "e6878-370", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.5.1(h610sp10c00)" }, { "model": "honor 10 lite", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.0.1.113(c675e11r1p12)" }, { "model": "anne-al00 \u003c=9.1.0.331", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "berkeley-l09 \u003c=10.0.1.1", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "cd16-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd17-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd17-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd18-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd18-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "columbia-tl00b \u003c=9.0.0.187", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "e6878-370 \u003c=10.0.5.1", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p30 lite \u003c=10.0.0.185", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p30 lite \u003c=10.0.0.197", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nova 4e \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "honor lite 9.0.1.113", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10" }, { "model": "lelandp-l22a \u003c=9.1.0.166", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-al00ax \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-al00bx \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-l22bx \u003c=10.0.0.188", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-l23bx \u003c=10.0.0.188", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "tc5200-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-11", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-12", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.23" }, { "model": "ws5200-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-17", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.23" }, { "model": "ws5800-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.3.27" }, { "model": "ws6500-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws6500-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.1.1\\(c675r1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.3.27", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9069" } ] }, "cve": "CVE-2020-9069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005593", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2020-36726", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005593", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9069", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-005593", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-36726", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202005-1099", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China\u0027s Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router", "sources": [ { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNVD", "id": "CNVD-2020-36726" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9069", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-005593", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-36726", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202005-1099", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "id": "VAR-202005-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" } ], "trust": 1.3640656644 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" } ] }, "last_update_date": "2023-12-18T13:12:58.319000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200520-01-leakage", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "title": "Patch for Multiple Huawei product information disclosure vulnerabilities (CNVD-2020-36726)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/224779" }, { "title": "Multiple Huawei Product information disclosure vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119391" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9069" }, { "trust": 1.6, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9069" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200520-01-leakage-cn" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2020-36726" }, { "date": "2020-06-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "date": "2020-05-21T15:15:10.123000", "db": "NVD", "id": "CVE-2020-9069" }, { "date": "2020-05-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2020-36726" }, { "date": "2020-06-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9069" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Information leakage vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1099" } ], "trust": 0.6 } }
var-202010-1178
Vulnerability from variot
Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1178", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws7200-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "ws5281-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.32" }, { "model": "ws5200-12", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.1.9" }, { "model": "hirouter-ct31-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.37" }, { "model": "hirouter-cd30-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.7" }, { "model": "ws5800-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.33" }, { "model": "ws7100-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.37" }, { "model": "ws5800-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.25" }, { "model": "ws5281-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.10" }, { "model": "hirouter-cd30-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.5" }, { "model": "hirouter-ct31-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.20" }, { "model": "ws7200-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.37" }, { "model": "ws5200-12", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.6" }, { "model": "ws7100-10", "scope": "gte", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "hirouter-cd30-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "hirouter-ct31-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5200-12", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5281-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5800-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7100-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws7200-10", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "hirouter-ct31-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.2.20" }, { "model": "ws5800-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.3.25" }, { "model": "hirouter-cd30-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.2.5" }, { "model": "ws5200-12", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.1.9" }, { "model": "ws5281-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.10" }, { "model": "ws7100-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.21" }, { "model": "ws7200-10", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.5.21" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.5.7", "versionStartIncluding": "10.0.2.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.2.37", "versionStartIncluding": "10.0.2.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.0.5.6", "versionStartIncluding": "10.0.1.9", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.5.32", "versionStartIncluding": "10.0.5.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.3.33", "versionStartIncluding": "10.0.3.25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9122" } ] }, "cve": "CVE-2020-9122", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9122", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2020-68353", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9122", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9122", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2020-68353", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202009-1682", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9122", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21. plural Huawei The product contains an input verification vulnerability.Denial of service (DoS) It may be put into a state. Huawei HiRouter-CD30-10, etc. are all wireless routers of China\u0027s Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9122", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012148", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-68353", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-1682", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-9122", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "id": "VAR-202010-1178", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" } ], "trust": 1.2815476428571428 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" } ] }, "last_update_date": "2023-12-18T13:47:21.525000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200930-01-verification", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "title": "Patch for Input verification vulnerabilities in multiple Huawei products (CNVD-2020-68353)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/241531" }, { "title": "HUAWEI Glory routing Pro 2 Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131161" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9122" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-verification-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189273" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-68353" }, { "db": "VULMON", "id": "CVE-2020-9122" }, { "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "db": "NVD", "id": "CVE-2020-9122" }, { "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-68353" }, { "date": "2020-10-12T00:00:00", "db": "VULMON", "id": "CVE-2020-9122" }, { "date": "2021-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "date": "2020-10-12T14:15:14.387000", "db": "NVD", "id": "CVE-2020-9122" }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-02T00:00:00", "db": "CNVD", "id": "CNVD-2020-68353" }, { "date": "2020-10-16T00:00:00", "db": "VULMON", "id": "CVE-2020-9122" }, { "date": "2021-04-26T07:54:00", "db": "JVNDB", "id": "JVNDB-2020-012148" }, { "date": "2020-10-16T15:42:46.857000", "db": "NVD", "id": "CVE-2020-9122" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1682" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1682" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1682" } ], "trust": 0.6 } }
var-202010-1166
Vulnerability from variot
WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal. WS5800-10 Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state. Huawei ws5800-10 is a wireless router of China's Huawei (Huawei) company.
Some Huawei home routers have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1166", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws5800-10", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.3.25" }, { "model": "ws5800-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "ws5800-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "ws5800-10 firmware 10.0.3.25" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:ws5800-10_firmware:10.0.3.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9230" } ] }, "cve": "CVE-2020-9230", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9230", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2020-60324", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9230", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9230", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2020-60324", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202009-1699", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9230", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "VULMON", "id": "CVE-2020-9230" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" }, { "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal. WS5800-10 Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state. Huawei ws5800-10 is a wireless router of China\u0027s Huawei (Huawei) company. \n\r\n\r\nSome Huawei home routers have security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2020-9230" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "VULMON", "id": "CVE-2020-9230" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9230", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012149", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-60324", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-1699", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-9230", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "VULMON", "id": "CVE-2020-9230" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" }, { "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "id": "VAR-202010-1166", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" } ], "trust": 1.2875 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" } ] }, "last_update_date": "2023-12-18T14:00:21.677000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200930-01-homerouter", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" }, { "title": "Patch for HUAWEI ws5800-10 data forgery issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/238405" }, { "title": "HUAWEI ws5800-10 Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131167" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.0 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9230" }, { "trust": 1.7, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200930-01-homerouter-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/345.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189255" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "VULMON", "id": "CVE-2020-9230" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" }, { "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-60324" }, { "db": "VULMON", "id": "CVE-2020-9230" }, { "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "db": "NVD", "id": "CVE-2020-9230" }, { "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-03T00:00:00", "db": "CNVD", "id": "CNVD-2020-60324" }, { "date": "2020-10-12T00:00:00", "db": "VULMON", "id": "CVE-2020-9230" }, { "date": "2021-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "date": "2020-10-12T14:15:14.497000", "db": "NVD", "id": "CVE-2020-9230" }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-03T00:00:00", "db": "CNVD", "id": "CNVD-2020-60324" }, { "date": "2020-10-16T00:00:00", "db": "VULMON", "id": "CVE-2020-9230" }, { "date": "2021-04-26T07:54:00", "db": "JVNDB", "id": "JVNDB-2020-012149" }, { "date": "2020-10-16T13:52:28.950000", "db": "NVD", "id": "CVE-2020-9230" }, { "date": "2021-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1699" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1699" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WS5800-10\u00a0 Vulnerability for inadequate validation of data reliability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012149" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1699" } ], "trust": 0.6 } }
cve-2020-9069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | HUAWEI | Anne-AL00 |
Version: earlier than 9.1.0.331(C675E9R1P3T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:19.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Anne-AL00", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] }, { "product": "Berkeley-L09", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.1.1(C675R1)" } ] }, { "product": "CD16-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "Columbia-TL00B", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] }, { "product": "E6878-370", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.5.1(H610SP10C00)" } ] }, { "product": "HUAWEI P30 lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.185(C605E3R1P3)" }, { "status": "affected", "version": "earlier than 10.0.0.197(C432E8R2P7)" } ] }, { "product": "HUAWEI nova 4e", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Honor 10 Lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "9.0.1.113(C675E11R1P12)" } ] }, { "product": "LelandP-L22A", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] }, { "product": "Marie-AL00AX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00AY", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-L03BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "Marie-L21BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C432E4R4P1)" }, { "status": "affected", "version": "earlier than 10.0.0.188(C461E5R3P1)" } ] }, { "product": "Marie-L22BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C636E3R3P1)" } ] }, { "product": "Marie-L23BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "TC5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-11", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-12", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-17", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5800-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.3.27" } ] }, { "product": "WS6500-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS6500-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-29T22:23:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Anne-AL00", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] } }, { "product_name": "Berkeley-L09", "version": { "version_data": [ { "version_value": "earlier than 10.0.1.1(C675R1)" } ] } }, { "product_name": "CD16-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "Columbia-TL00B", "version": { "version_data": [ { "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] } }, { "product_name": "E6878-370", "version": { "version_data": [ { "version_value": "earlier than 10.0.5.1(H610SP10C00)" } ] } }, { "product_name": "HUAWEI P30 lite", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.185(C605E3R1P3)" }, { "version_value": "earlier than 10.0.0.197(C432E8R2P7)" } ] } }, { "product_name": "HUAWEI nova 4e", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Honor 10 Lite", "version": { "version_data": [ { "version_value": "9.0.1.113(C675E11R1P12)" } ] } }, { "product_name": "LelandP-L22A", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] } }, { "product_name": "Marie-AL00AX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00AY", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-L03BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "Marie-L21BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C432E4R4P1)" }, { "version_value": "earlier than 10.0.0.188(C461E5R3P1)" } ] } }, { "product_name": "Marie-L22BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C636E3R3P1)" } ] } }, { "product_name": "Marie-L23BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "TC5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-11", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-12", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-17", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5800-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.3.27" } ] } }, { "product_name": "WS6500-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS6500-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } } ] }, "vendor_name": "HUAWEI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9069", "datePublished": "2020-05-21T14:19:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:19.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9122
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10 |
Version: 10.0.2.5 Version: 10.0.2.20 Version: 10.0.1.9 Version: 10.0.5.10 Version: 10.0.3.25 Version: 10.0.5.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.2.5" }, { "status": "affected", "version": "10.0.2.20" }, { "status": "affected", "version": "10.0.1.9" }, { "status": "affected", "version": "10.0.5.10" }, { "status": "affected", "version": "10.0.3.25" }, { "status": "affected", "version": "10.0.5.21" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Input Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-12T13:37:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HiRouter-CD30-10;HiRouter-CT31-10;WS5200-12;WS5281-10;WS5800-10;WS7100-10;WS7200-10", "version": { "version_data": [ { "version_value": "10.0.2.5" }, { "version_value": "10.0.2.20" }, { "version_value": "10.0.1.9" }, { "version_value": "10.0.5.10" }, { "version_value": "10.0.3.25" }, { "version_value": "10.0.5.21" }, { "version_value": "10.0.5.21" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Input Verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9122", "datePublished": "2020-10-12T13:37:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9230
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WS5800-10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.3.25" } ] } ], "descriptions": [ { "lang": "en", "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-12T13:25:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WS5800-10", "version": { "version_data": [ { "version_value": "10.0.3.25" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9230", "datePublished": "2020-10-12T13:25:11", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | ws5800-10_firmware | 10.0.3.25 | |
huawei | ws5800-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:10.0.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "73057F79-DC07-427F-9F1E-4C3CFF34C60C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal." }, { "lang": "es", "value": "El Dispositivo WS5800-10 versi\u00f3n 10.0.3.25, presenta una vulnerabilidad de denegaci\u00f3n de servicio.\u0026#xa0;Debido a la verificaci\u00f3n incorrecta de un mensaje espec\u00edfico, un atacante puede explotar esta vulnerabilidad para causar que una funci\u00f3n espec\u00edfica se vuelva anormal" } ], "id": "CVE-2020-9230", "lastModified": "2024-11-21T05:40:12.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-12T14:15:14.497", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-homerouter-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61FF27C-1D5A-414C-88BE-A4E1567D57E3", "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7BA6CC3-74ED-4936-B5F3-09AE0942D7F1", "versionEndExcluding": "10.0.1.1\\(c675r1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E7A9EC-D51E-4E00-9E20-397405DD405E", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1259623C-9765-4A03-B984-71BC23832EA5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5021FFF9-39E9-4392-8F7B-77C99AD9021B", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "192D571A-3612-48FF-AD58-F85C05109DB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99350875-103C-4E3D-A3F1-CB51A3F04CAB", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "541F6EEE-365C-4317-BE40-5D1780023B37", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "272588E3-15DA-48C5-B5EA-E53D981294B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78009F5F-1CC7-41D5-B3D7-DFDD6888CF98", "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A597E29-2CFE-4D6F-8141-D0A8A04C7BF9", "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01770930-E2A3-4759-8367-4DAA53046B20", "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93DD848A-F0E2-4064-BB74-9FC5C82157AB", "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*", "matchCriteriaId": "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BE98F19-5883-4C1F-892E-4AEF2DB7EDB0", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "392304B7-F9CD-44B4-88FB-353A650DB700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01371306-680F-4007-8E5A-865C67D657E5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA3F67-7545-444D-BCCB-133B6680F3A7", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D3BD34-4095-4730-995D-5731A0BB8BF9", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E7101C-170D-4EA2-96A7-410AE55137BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23D525C1-B8A9-422B-A315-73BF6D4DEF7B", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EAA19C-B250-4809-BE4A-4575D5F793A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "738EA159-65D7-42FE-B29F-1890F93A1A5D", "versionEndExcluding": "10.0.3.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDF3E0C-594B-48BF-8E9F-4A10A11D5449", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0571923-C1D0-4F06-AD1E-9D43F5290B74", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "B611DA7B-A2E3-44A3-BC8B-C43308EF3E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" }, { "lang": "es", "value": "Hay una vulnerabilidad de filtrado de informaci\u00f3n en algunos productos Huawei. Un atacante adyacente no autenticado podr\u00eda explotar esta vulnerabilidad para descifrar datos. Las versiones de producto afectadas incluyen: Anne-AL00 Versiones anteriores a la versi\u00f3n 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versiones anteriores a la versi\u00f3n 10.0.1.1(C675R1); CD16-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.han 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versiones anteriores a la versi\u00f3n 10.0.0.185(C605E3R1P3), Versiones anteriores a la versi\u00f3n 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versiones anteriores a la versi\u00f3n 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00AY Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00BX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-L03BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); Marie-L21BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C432E4R4P1), V 10.0.0.188(C461E5R3P1); Marie-L22BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C636E3R3P1); Marie-L23BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); TC5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-11 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-12 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-17 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5800-10 Versiones anteriores a la versi\u00f3n 10.0.3.27; WS6500-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS6500-16 Versiones anteriores a la versi\u00f3n 10.0.2.8" } ], "id": "CVE-2020-9069", "lastModified": "2024-11-21T05:39:57.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-21T15:15:10.123", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
huawei | hirouter-cd30-10_firmware | * | |
huawei | hirouter-cd30-10 | - | |
huawei | hirouter-ct31-10_firmware | * | |
huawei | hirouter-ct31-10 | - | |
huawei | ws5200-12_firmware | * | |
huawei | ws5200-12 | - | |
huawei | ws5281-10_firmware | * | |
huawei | ws5281-10 | - | |
huawei | ws5800-10_firmware | * | |
huawei | ws5800-10 | - | |
huawei | ws7100-10_firmware | * | |
huawei | ws7100-10 | - | |
huawei | ws7200-10_firmware | * | |
huawei | ws7200-10 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21DAB41B-30DC-4621-9AF0-D60EAB48511B", "versionEndExcluding": "10.0.5.7", "versionStartIncluding": "10.0.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "593BD59F-41AA-4AEB-8F13-43484BE26E1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hirouter-ct31-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86B841D5-A00F-4A94-B90D-3183C33429FB", "versionEndExcluding": "10.0.2.37", "versionStartIncluding": "10.0.2.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hirouter-ct31-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD8A7CD-6AF2-4681-9DED-1A225623FC18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EACB670B-E1DC-4734-9683-D3A732F61A54", "versionEndIncluding": "10.0.5.6", "versionStartIncluding": "10.0.1.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DE8454-E98B-4AA4-97A9-61DC3BB0E4B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5281-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6855ED3B-FD30-4A51-B748-68A21DDD183D", "versionEndExcluding": "10.0.5.32", "versionStartIncluding": "10.0.5.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5281-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A157FDA-330F-4DF0-AF48-8570B4734D62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FE6EB21-4CBC-4E98-BC81-05A298941727", "versionEndExcluding": "10.0.3.33", "versionStartIncluding": "10.0.3.25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7100-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F83A176-A2F9-478C-BFA3-1A637095E88B", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7100-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "990433C4-F54F-4B50-8972-68F1CF485E1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "923DA700-265A-4099-BC3D-E5A44A1D747F", "versionEndExcluding": "10.0.5.37", "versionStartIncluding": "10.0.5.21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21." }, { "lang": "es", "value": "Algunos productos Huawei presentan una vulnerabilidad de verificaci\u00f3n de entrada insuficiente.\u0026#xa0;Los atacantes pueden explotar esta vulnerabilidad en la LAN para causar un servicio anormal en los dispositivos afectados. Las versiones de productos afectados incluyen: HiRouter-CD30-10 versi\u00f3n 10.0.2.5; HiRouter-CT31-10 versi\u00f3n 10.0.2.20; WS5200-12 versi\u00f3n 10.0.1.9; WS5281 -10 versi\u00f3n 10.0.5.10; WS5800-10 versi\u00f3n 10.0.3.25; WS7100-10 versi\u00f3n 10.0.5.21; WS7200-10 versi\u00f3n 10.0.5.21" } ], "id": "CVE-2020-9122", "lastModified": "2024-11-21T05:40:05.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-12T14:15:14.387", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-verification-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }