CNVD-2021-24915

Vulnerability from cnvd - Published: 2021-04-04
VLAI Severity ?
Title
多款Huawei产品拒绝服务漏洞(CNVD-2021-24915)
Description
Huawei NGFW Module等都是中国华为(Huawei)公司的产品。NGFW Module是一款下一代防火墙(NGFW)模块。Huawei NIP6800是一套入侵防御系统。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。 多款Huawei产品存在拒绝服务漏洞。该漏洞源于在某些特殊场景下对报文的不适当处理,攻击者恶意构造大量的此类报文,成功利用可导致某些业务异常。
Severity
Patch Name
多款Huawei产品拒绝服务漏洞(CNVD-2021-24915)的补丁
Patch Description
Huawei NGFW Module等都是中国华为(Huawei)公司的产品。NGFW Module是一款下一代防火墙(NGFW)模块。Huawei NIP6800是一套入侵防御系统。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。 多款Huawei产品存在拒绝服务漏洞。该漏洞源于在某些特殊场景下对报文的不适当处理,攻击者恶意构造大量的此类报文,成功利用可导致某些业务异常。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.huawei.com/cn/psirt/security-advisories/2021/huawei-sa-20210210-02-dos-cn

Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-9213
Impacted products
Name
['Huawei NIP6300 V500R001C30', 'Huawei NIP6600 V500R001C30', 'Huawei Secospace USG6500 V500R001C30', 'Huawei Secospace USG6600 V500R001C30', 'Huawei USG9500 V500R001C30', 'Huawei NIP6300 V500R005C00', 'Huawei NIP6600 V500R005C00', 'Huawei USG9500 V500R005C00', 'Huawei Secospace USG6600 V500R005C00', 'Huawei NIP6800 V500R005C00', 'Huawei NGFW Module V500R005C00', 'Huawei NIP6800 V500R001C60', 'Huawei Secospace USG6600 V500R001C60', 'Huawei Secospace USG6300 V500R005C00', 'Huawei Secospace USG6300 V500R001C60', 'Huawei Secospace USG6500 V500R005C00', 'Huawei Secospace USG6500 V500R001C60', 'Huawei NIP6300 V500R001C60', 'Huawei NIP6600 V500R001C60', 'Huawei Secospace USG6300 V500R001C30', 'Huawei USG9500 V500R001C60']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-9213",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-9213"
    }
  },
  "description": "Huawei NGFW Module\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002NGFW Module\u662f\u4e00\u6b3e\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\uff08NGFW\uff09\u6a21\u5757\u3002Huawei NIP6800\u662f\u4e00\u5957\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002\n\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728\u67d0\u4e9b\u7279\u6b8a\u573a\u666f\u4e0b\u5bf9\u62a5\u6587\u7684\u4e0d\u9002\u5f53\u5904\u7406\uff0c\u653b\u51fb\u8005\u6076\u610f\u6784\u9020\u5927\u91cf\u7684\u6b64\u7c7b\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u53ef\u5bfc\u81f4\u67d0\u4e9b\u4e1a\u52a1\u5f02\u5e38\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.huawei.com/cn/psirt/security-advisories/2021/huawei-sa-20210210-02-dos-cn",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-24915",
  "openTime": "2021-04-04",
  "patchDescription": "Huawei NGFW Module\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002NGFW Module\u662f\u4e00\u6b3e\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\uff08NGFW\uff09\u6a21\u5757\u3002Huawei NIP6800\u662f\u4e00\u5957\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002\r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728\u67d0\u4e9b\u7279\u6b8a\u573a\u666f\u4e0b\u5bf9\u62a5\u6587\u7684\u4e0d\u9002\u5f53\u5904\u7406\uff0c\u653b\u51fb\u8005\u6076\u610f\u6784\u9020\u5927\u91cf\u7684\u6b64\u7c7b\u62a5\u6587\uff0c\u6210\u529f\u5229\u7528\u53ef\u5bfc\u81f4\u67d0\u4e9b\u4e1a\u52a1\u5f02\u5e38\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2021-24915\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei NIP6300 V500R001C30",
      "Huawei NIP6600 V500R001C30",
      "Huawei Secospace USG6500 V500R001C30",
      "Huawei Secospace USG6600 V500R001C30",
      "Huawei USG9500 V500R001C30",
      "Huawei NIP6300 V500R005C00",
      "Huawei NIP6600 V500R005C00",
      "Huawei USG9500 V500R005C00",
      "Huawei Secospace USG6600 V500R005C00",
      "Huawei NIP6800 V500R005C00",
      "Huawei NGFW Module V500R005C00",
      "Huawei NIP6800 V500R001C60",
      "Huawei Secospace USG6600 V500R001C60",
      "Huawei Secospace USG6300 V500R005C00",
      "Huawei Secospace USG6300 V500R001C60",
      "Huawei Secospace USG6500 V500R005C00",
      "Huawei Secospace USG6500 V500R001C60",
      "Huawei NIP6300 V500R001C60",
      "Huawei NIP6600 V500R001C60",
      "Huawei Secospace USG6300 V500R001C30",
      "Huawei USG9500 V500R001C60"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-9213",
  "serverity": "\u4e2d",
  "submitTime": "2021-03-26",
  "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2021-24915\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…