CNVD-2021-24919

Vulnerability from cnvd - Published: 2021-04-04
VLAI Severity ?
Title
多款Huawei产品信息泄露漏洞(CNVD-2021-24919)
Description
Huawei NIP6300等都是中国华为(Huawei)公司的产品。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei NIP6600是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei Secospace USG6300是一款防火墙设备。 多款Huawei产品存在信息泄露漏洞。该漏洞源于不合理设计,在某个特殊异常场景下,服务器日志会打印出一些具体的不合理信息,攻击者可利用漏洞导致信息泄露。
Severity
Patch Name
多款Huawei产品信息泄露漏洞(CNVD-2021-24919)的补丁
Patch Description
Huawei NIP6300等都是中国华为(Huawei)公司的产品。Huawei NIP6300是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei NIP6600是一款主要适用于企业、学校、运行商、IDC的入侵防御系统。Huawei Secospace USG6300是一款防火墙设备。 多款Huawei产品存在信息泄露漏洞。该漏洞源于不合理设计,在某个特殊异常场景下,服务器日志会打印出一些具体的不合理信息,攻击者可利用漏洞导致信息泄露。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en

Reference
https://nvd.nist.gov/vuln/detail/CVE-2021-22310
Impacted products
Name
['Huawei NIP6300 V500R001C00', 'Huawei NIP6600 V500R001C00', 'Huawei Secospace USG6500 V500R001C00', 'Huawei Secospace USG6600 V500R001C00', 'Huawei NIP6300 V500R001C20', 'Huawei NIP6300 V500R001C30', 'Huawei NIP6600 V500R001C20', 'Huawei NIP6600 V500R001C30', 'Huawei Secospace USG6300 V500R001C00', 'Huawei Secospace USG6300 V500R001C20', 'Huawei Secospace USG6500 V500R001C20', 'Huawei Secospace USG6500 V500R001C30', 'Huawei Secospace USG6600 V500R001C20', 'Huawei Secospace USG6600 V500R001C30', 'Huawei Secospace USG6600 V500R001C50', 'Huawei USG9500 V500R005C00', 'Huawei Secospace USG6600 V500R001C60', 'Huawei USG9500 V500R005C10', 'Huawei Secospace USG6300 V500R001C30']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-22310",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-22310"
    }
  },
  "description": "Huawei NIP6300\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6600\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei Secospace USG6300\u662f\u4e00\u6b3e\u9632\u706b\u5899\u8bbe\u5907\u3002 \n\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0d\u5408\u7406\u8bbe\u8ba1\uff0c\u5728\u67d0\u4e2a\u7279\u6b8a\u5f02\u5e38\u573a\u666f\u4e0b\uff0c\u670d\u52a1\u5668\u65e5\u5fd7\u4f1a\u6253\u5370\u51fa\u4e00\u4e9b\u5177\u4f53\u7684\u4e0d\u5408\u7406\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210203-01-plaintextlog-en",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-24919",
  "openTime": "2021-04-04",
  "patchDescription": "Huawei NIP6300\u7b49\u90fd\u662f\u4e2d\u56fd\u534e\u4e3a\uff08Huawei\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Huawei NIP6300\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei NIP6600\u662f\u4e00\u6b3e\u4e3b\u8981\u9002\u7528\u4e8e\u4f01\u4e1a\u3001\u5b66\u6821\u3001\u8fd0\u884c\u5546\u3001IDC\u7684\u5165\u4fb5\u9632\u5fa1\u7cfb\u7edf\u3002Huawei Secospace USG6300\u662f\u4e00\u6b3e\u9632\u706b\u5899\u8bbe\u5907\u3002 \r\n\r\n\u591a\u6b3eHuawei\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0d\u5408\u7406\u8bbe\u8ba1\uff0c\u5728\u67d0\u4e2a\u7279\u6b8a\u5f02\u5e38\u573a\u666f\u4e0b\uff0c\u670d\u52a1\u5668\u65e5\u5fd7\u4f1a\u6253\u5370\u51fa\u4e00\u4e9b\u5177\u4f53\u7684\u4e0d\u5408\u7406\u4fe1\u606f\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2021-24919\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Huawei NIP6300 V500R001C00",
      "Huawei NIP6600 V500R001C00",
      "Huawei Secospace USG6500 V500R001C00",
      "Huawei Secospace USG6600 V500R001C00",
      "Huawei NIP6300 V500R001C20",
      "Huawei NIP6300 V500R001C30",
      "Huawei NIP6600 V500R001C20",
      "Huawei NIP6600 V500R001C30",
      "Huawei Secospace USG6300 V500R001C00",
      "Huawei Secospace USG6300 V500R001C20",
      "Huawei Secospace USG6500 V500R001C20",
      "Huawei Secospace USG6500 V500R001C30",
      "Huawei Secospace USG6600 V500R001C20",
      "Huawei Secospace USG6600 V500R001C30",
      "Huawei Secospace USG6600 V500R001C50",
      "Huawei USG9500 V500R005C00",
      "Huawei Secospace USG6600 V500R001C60",
      "Huawei USG9500 V500R005C10",
      "Huawei Secospace USG6300 V500R001C30"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-22310",
  "serverity": "\u4f4e",
  "submitTime": "2021-02-05",
  "title": "\u591a\u6b3eHuawei\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2021-24919\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…