CVE-2017-17300 (GCVE-0-2017-17300)
Vulnerability from cvelistv5 – Published: 2018-02-15 16:00 – Updated: 2024-08-05 20:51
VLAI?
Summary
Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.
Severity ?
No CVSS data available.
CWE
- numeric errors
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei Technologies Co., Ltd. | S12700,S5700,S6700,S7700,S9700 |
Affected:
S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:51:30.510Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "S12700,S5700,S6700,S7700,S9700",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00"
}
]
}
],
"datePublic": "2017-12-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "numeric errors",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-15T15:57:02",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2017-17300",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "S12700,S5700,S6700,S7700,S9700",
"version": {
"version_data": [
{
"version_value": "S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00"
}
]
}
}
]
},
"vendor_name": "Huawei Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "numeric errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2017-17300",
"datePublished": "2018-02-15T16:00:00",
"dateReserved": "2017-12-04T00:00:00",
"dateUpdated": "2024-08-05T20:51:30.510Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B17A34EF-677D-4264-82FB-F7F582C9F56B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40745A01-E5AC-4207-A34F-D8E7F7231F83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48B5A9B7-A931-4806-8AC7-302C6CA49CF1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DA5CF67-A58B-4666-B87E-712507233453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9EA93B5-01A5-4506-9B0A-993621E6940E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01A0EC8F-6A8A-487F-A92A-789E3789788F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.\"}, {\"lang\": \"es\", \"value\": \"Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00 y V200R009C00 tienen una vulnerabilidad de errores num\\u00e9ricos. Un atacante remoto no autenticado podr\\u00eda enviar mensajes TCP espec\\u00edficos con la opci\\u00f3n de autenticaci\\u00f3n keychain a los productos afectados. Debido a la validaci\\u00f3n indebida de los mensajes, provocar\\u00e1 errores num\\u00e9ricos al gestionar los mensajes. Su explotaci\\u00f3n con \\u00e9xito provocar\\u00e1 que los productos afectados se restablezcan.\"}]",
"id": "CVE-2017-17300",
"lastModified": "2024-11-21T03:17:47.220",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-02-15T16:29:03.563",
"references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-17300\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2018-02-15T16:29:03.563\",\"lastModified\":\"2024-11-21T03:17:47.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset.\"},{\"lang\":\"es\",\"value\":\"Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00 y V200R009C00 tienen una vulnerabilidad de errores num\u00e9ricos. Un atacante remoto no autenticado podr\u00eda enviar mensajes TCP espec\u00edficos con la opci\u00f3n de autenticaci\u00f3n keychain a los productos afectados. Debido a la validaci\u00f3n indebida de los mensajes, provocar\u00e1 errores num\u00e9ricos al gestionar los mensajes. Su explotaci\u00f3n con \u00e9xito provocar\u00e1 que los productos afectados se restablezcan.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4C5CC9-FD60-4C64-8F88-CFC71BBEA663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s12700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17A34EF-677D-4264-82FB-F7F582C9F56B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138C1E57-176C-46B1-9704-D9C8391CC802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40745A01-E5AC-4207-A34F-D8E7F7231F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21FFF548-FBEF-468A-A8DE-1DB1B7C0B3AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s5700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B5A9B7-A931-4806-8AC7-302C6CA49CF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E22D3CFF-3353-4EE2-8933-84F395469D0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA5CF67-A58B-4666-B87E-712507233453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s6700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EA93B5-01A5-4506-9B0A-993621E6940E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA7AC10D-B0DD-4206-8642-134DDD585C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D79CD09-3414-4105-AD59-F3D1BAC61B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s7700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB2A3C92-C5C6-4BE6-A9F6-21C28D68C080\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8769C2C4-E333-432B-8943-CFDFAE013379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36AB80F7-1BD2-4169-AC70-708CE84BB15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:s9700_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A0EC8F-6A8A-487F-A92A-789E3789788F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75FAA4BF-1ED0-4059-ADA1-071AF1BF2882\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171215-01-router-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…