CVE-2017-8162 (GCVE-0-2017-8162)
Vulnerability from cvelistv5 – Published: 2017-11-22 19:00 – Updated: 2024-09-16 19:41
VLAI?
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.
Severity ?
No CVSS data available.
CWE
- DoS
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 |
Affected:
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:27:22.877Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
"vendor": "Huawei Technologies Co., Ltd.",
"versions": [
{
"status": "affected",
"version": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]"
}
]
}
],
"datePublic": "2017-11-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "DoS",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-22T18:57:01",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
}
],
"x_ConverterErrors": {
"version_name": {
"error": "version_name too long. Use array of versions to record more than one version.",
"message": "Truncated!"
}
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"DATE_PUBLIC": "2017-11-15T00:00:00",
"ID": "CVE-2017-8162",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300",
"version": {
"version_data": [
{
"version_value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30"
}
]
}
}
]
},
"vendor_name": "Huawei Technologies Co., Ltd."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DoS"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2017-8162",
"datePublished": "2017-11-22T19:00:00Z",
"dateReserved": "2017-04-25T00:00:00",
"dateUpdated": "2024-09-16T19:41:24.286Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD9E894-321E-4A61-9DA6-677042DDD739\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79DA91B4-77A6-4A37-8799-5E548184D49C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42376C56-573F-4A88-B18E-43F636B17B41\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFE416CD-53B5-4E08-BB30-682887740C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D6C34F-ED85-461D-89AF-3B8C439867FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4459EF03-890E-446E-8702-8F7CE499FB48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C623D44E-463B-49A3-81F8-AD219E035B09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D125153E-FE39-49A7-95AA-9482C78E7114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455D7A4E-523E-40C8-958D-59D128F3E797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B64AE02-D345-4628-A086-7C63C255707C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"787AC5E3-CE88-491D-8211-BAB11112019D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"868602DB-D063-4BE4-A02B-936433CD8231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A72083-717F-4C71-A2D7-62E1C64FEE94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34CCEC64-BD07-49F7-8804-98A74257F060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A685289C-08B1-43D4-9970-84A7FC75E54B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"622686BB-9302-449F-9351-75B189D1B184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5186D104-FD41-4F54-9923-25B0C8C09E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE9B95EB-A848-4311-8500-9C909784393E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B487D436-B96E-4781-AFFD-2136154F9166\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F042B27-F875-4BA3-9002-E5ADC544208B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F377CE1E-77A7-447F-B692-A54682A26BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5CCF46F-1B0F-4829-BB28-758777313451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50662078-4827-4706-AE29-170E2239C5AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32119825-AF22-44AA-8D04-1FAACF9E2E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B897F931-00B2-4FDF-90CE-5077416E42BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0595B3AA-8911-44AF-996B-2F431517FBED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A842B77-C902-4B20-A171-3F98C75E6160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4072905-CA96-44F9-8868-BB20BDC56EE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CE13681-CF1A-4765-B35A-E6E674C334B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50C579A9-2768-4202-9171-BC803554E923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE7A0E2C-8383-443D-8625-77CBC53D2140\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51387999-E9D0-497F-A309-CA5E3126EB00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611E69A3-AB62-4584-B611-93583D84FCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B319F31F-94D7-468F-8F71-96F40867AEA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E497D97B-F044-4F9A-84B0-378978FBDC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.\"}, {\"lang\": \"es\", \"value\": \"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegaci\\u00f3n de servicio (DoS). A causa de una l\\u00f3gica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podr\\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\\u00f3n exitosa de esta vulnerabilidad podr\\u00eda provocar un desbordamiento de pila y hacer que un servicio no est\\u00e9 disponible.\"}]",
"id": "CVE-2017-8162",
"lastModified": "2024-11-21T03:33:26.677",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:P\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-11-22T19:29:03.773",
"references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-8162\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-11-22T19:29:03.773\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.\"},{\"lang\":\"es\",\"value\":\"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS). A causa de una l\u00f3gica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podr\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar un desbordamiento de pila y hacer que un servicio no est\u00e9 disponible.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD9E894-321E-4A61-9DA6-677042DDD739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DA91B4-77A6-4A37-8799-5E548184D49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42376C56-573F-4A88-B18E-43F636B17B41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE416CD-53B5-4E08-BB30-682887740C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D6C34F-ED85-461D-89AF-3B8C439867FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4459EF03-890E-446E-8702-8F7CE499FB48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C623D44E-463B-49A3-81F8-AD219E035B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125153E-FE39-49A7-95AA-9482C78E7114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455D7A4E-523E-40C8-958D-59D128F3E797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B64AE02-D345-4628-A086-7C63C255707C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787AC5E3-CE88-491D-8211-BAB11112019D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868602DB-D063-4BE4-A02B-936433CD8231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A72083-717F-4C71-A2D7-62E1C64FEE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CCEC64-BD07-49F7-8804-98A74257F060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685289C-08B1-43D4-9970-84A7FC75E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622686BB-9302-449F-9351-75B189D1B184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5186D104-FD41-4F54-9923-25B0C8C09E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE9B95EB-A848-4311-8500-9C909784393E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487D436-B96E-4781-AFFD-2136154F9166\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F042B27-F875-4BA3-9002-E5ADC544208B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F377CE1E-77A7-447F-B692-A54682A26BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CCF46F-1B0F-4829-BB28-758777313451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50662078-4827-4706-AE29-170E2239C5AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32119825-AF22-44AA-8D04-1FAACF9E2E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897F931-00B2-4FDF-90CE-5077416E42BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0595B3AA-8911-44AF-996B-2F431517FBED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A842B77-C902-4B20-A171-3F98C75E6160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4072905-CA96-44F9-8868-BB20BDC56EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE13681-CF1A-4765-B35A-E6E674C334B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C579A9-2768-4202-9171-BC803554E923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7A0E2C-8383-443D-8625-77CBC53D2140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51387999-E9D0-497F-A309-CA5E3126EB00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611E69A3-AB62-4584-B611-93583D84FCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B319F31F-94D7-468F-8F71-96F40867AEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E497D97B-F044-4F9A-84B0-378978FBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…