cve-2017-8162
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 19:41
Severity ?
EPSS score ?
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 |
Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*] |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:27:22.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-22T18:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-8162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", "version": { "version_data": [ { "version_value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-8162", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2017-04-25T00:00:00", "dateUpdated": "2024-09-16T19:41:24.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD9E894-321E-4A61-9DA6-677042DDD739\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79DA91B4-77A6-4A37-8799-5E548184D49C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42376C56-573F-4A88-B18E-43F636B17B41\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFE416CD-53B5-4E08-BB30-682887740C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D6C34F-ED85-461D-89AF-3B8C439867FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4459EF03-890E-446E-8702-8F7CE499FB48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C623D44E-463B-49A3-81F8-AD219E035B09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D125153E-FE39-49A7-95AA-9482C78E7114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455D7A4E-523E-40C8-958D-59D128F3E797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B64AE02-D345-4628-A086-7C63C255707C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"787AC5E3-CE88-491D-8211-BAB11112019D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"868602DB-D063-4BE4-A02B-936433CD8231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A72083-717F-4C71-A2D7-62E1C64FEE94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34CCEC64-BD07-49F7-8804-98A74257F060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A685289C-08B1-43D4-9970-84A7FC75E54B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"622686BB-9302-449F-9351-75B189D1B184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5186D104-FD41-4F54-9923-25B0C8C09E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE9B95EB-A848-4311-8500-9C909784393E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B487D436-B96E-4781-AFFD-2136154F9166\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F042B27-F875-4BA3-9002-E5ADC544208B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F377CE1E-77A7-447F-B692-A54682A26BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5CCF46F-1B0F-4829-BB28-758777313451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50662078-4827-4706-AE29-170E2239C5AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32119825-AF22-44AA-8D04-1FAACF9E2E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B897F931-00B2-4FDF-90CE-5077416E42BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0595B3AA-8911-44AF-996B-2F431517FBED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A842B77-C902-4B20-A171-3F98C75E6160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4072905-CA96-44F9-8868-BB20BDC56EE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CE13681-CF1A-4765-B35A-E6E674C334B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50C579A9-2768-4202-9171-BC803554E923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE7A0E2C-8383-443D-8625-77CBC53D2140\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51387999-E9D0-497F-A309-CA5E3126EB00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611E69A3-AB62-4584-B611-93583D84FCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B319F31F-94D7-468F-8F71-96F40867AEA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E497D97B-F044-4F9A-84B0-378978FBDC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.\"}, {\"lang\": \"es\", \"value\": \"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegaci\\u00f3n de servicio (DoS). A causa de una l\\u00f3gica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podr\\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\\u00f3n exitosa de esta vulnerabilidad podr\\u00eda provocar un desbordamiento de pila y hacer que un servicio no est\\u00e9 disponible.\"}]", "id": "CVE-2017-8162", "lastModified": "2024-11-21T03:33:26.677", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:P\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-11-22T19:29:03.773", "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-8162\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-11-22T19:29:03.773\",\"lastModified\":\"2024-11-21T03:33:26.677\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have a DoS vulnerability. Due to incorrect malformed message processing logic, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause stack overflow and make a service unavailable.\"},{\"lang\":\"es\",\"value\":\"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de denegaci\u00f3n de servicio (DoS). A causa de una l\u00f3gica de procesamiento de mensajes mal formados incorrecta, un atacante remoto autenticado podr\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar un desbordamiento de pila y hacer que un servicio no est\u00e9 disponible.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD9E894-321E-4A61-9DA6-677042DDD739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DA91B4-77A6-4A37-8799-5E548184D49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42376C56-573F-4A88-B18E-43F636B17B41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE416CD-53B5-4E08-BB30-682887740C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D6C34F-ED85-461D-89AF-3B8C439867FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4459EF03-890E-446E-8702-8F7CE499FB48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C623D44E-463B-49A3-81F8-AD219E035B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125153E-FE39-49A7-95AA-9482C78E7114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455D7A4E-523E-40C8-958D-59D128F3E797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B64AE02-D345-4628-A086-7C63C255707C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787AC5E3-CE88-491D-8211-BAB11112019D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868602DB-D063-4BE4-A02B-936433CD8231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A72083-717F-4C71-A2D7-62E1C64FEE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CCEC64-BD07-49F7-8804-98A74257F060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685289C-08B1-43D4-9970-84A7FC75E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622686BB-9302-449F-9351-75B189D1B184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5186D104-FD41-4F54-9923-25B0C8C09E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE9B95EB-A848-4311-8500-9C909784393E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487D436-B96E-4781-AFFD-2136154F9166\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F042B27-F875-4BA3-9002-E5ADC544208B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F377CE1E-77A7-447F-B692-A54682A26BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CCF46F-1B0F-4829-BB28-758777313451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50662078-4827-4706-AE29-170E2239C5AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32119825-AF22-44AA-8D04-1FAACF9E2E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897F931-00B2-4FDF-90CE-5077416E42BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0595B3AA-8911-44AF-996B-2F431517FBED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A842B77-C902-4B20-A171-3F98C75E6160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4072905-CA96-44F9-8868-BB20BDC56EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE13681-CF1A-4765-B35A-E6E674C334B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C579A9-2768-4202-9171-BC803554E923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7A0E2C-8383-443D-8625-77CBC53D2140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51387999-E9D0-497F-A309-CA5E3126EB00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611E69A3-AB62-4584-B611-93583D84FCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B319F31F-94D7-468F-8F71-96F40867AEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E497D97B-F044-4F9A-84B0-378978FBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.