cve-2017-8163
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 18:09
Severity ?
EPSS score ?
Summary
AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300 |
Version: AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*] |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:27:22.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, ...[truncated*]" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-22T18:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-8163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AR120-S,AR1200,AR1200-S,AR150,AR150-S,AR160,AR200,AR200-S,AR2200,AR2200-S,AR3200,AR510,NetEngine16EX,SMC2.0,SRG1300,SRG2300,SRG3300", "version": { "version_data": [ { "version_value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-8163", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2017-04-25T00:00:00", "dateUpdated": "2024-09-16T18:09:25.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DD9E894-321E-4A61-9DA6-677042DDD739\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79DA91B4-77A6-4A37-8799-5E548184D49C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42376C56-573F-4A88-B18E-43F636B17B41\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFE416CD-53B5-4E08-BB30-682887740C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D6C34F-ED85-461D-89AF-3B8C439867FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4459EF03-890E-446E-8702-8F7CE499FB48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C623D44E-463B-49A3-81F8-AD219E035B09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D125153E-FE39-49A7-95AA-9482C78E7114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455D7A4E-523E-40C8-958D-59D128F3E797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B64AE02-D345-4628-A086-7C63C255707C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"787AC5E3-CE88-491D-8211-BAB11112019D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"868602DB-D063-4BE4-A02B-936433CD8231\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A72083-717F-4C71-A2D7-62E1C64FEE94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34CCEC64-BD07-49F7-8804-98A74257F060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A685289C-08B1-43D4-9970-84A7FC75E54B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"622686BB-9302-449F-9351-75B189D1B184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5186D104-FD41-4F54-9923-25B0C8C09E22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE9B95EB-A848-4311-8500-9C909784393E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B487D436-B96E-4781-AFFD-2136154F9166\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F042B27-F875-4BA3-9002-E5ADC544208B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F377CE1E-77A7-447F-B692-A54682A26BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5CCF46F-1B0F-4829-BB28-758777313451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50662078-4827-4706-AE29-170E2239C5AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32119825-AF22-44AA-8D04-1FAACF9E2E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B897F931-00B2-4FDF-90CE-5077416E42BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0595B3AA-8911-44AF-996B-2F431517FBED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A842B77-C902-4B20-A171-3F98C75E6160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4072905-CA96-44F9-8868-BB20BDC56EE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CE13681-CF1A-4765-B35A-E6E674C334B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50C579A9-2768-4202-9171-BC803554E923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE7A0E2C-8383-443D-8625-77CBC53D2140\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51387999-E9D0-497F-A309-CA5E3126EB00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611E69A3-AB62-4584-B611-93583D84FCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B319F31F-94D7-468F-8F71-96F40867AEA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E497D97B-F044-4F9A-84B0-378978FBDC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.\"}, {\"lang\": \"es\", \"value\": \"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de lectura fuera de l\\u00edmites. A causa de una validaci\\u00f3n de entradas insuficiente, un atacante remoto autenticado podr\\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\\u00f3n exitosa de esta vulnerabilidad podr\\u00eda provocar una lectura fuera de l\\u00edmites y el cierre inesperado del sistema.\"}]", "id": "CVE-2017-8163", "lastModified": "2024-11-21T03:33:26.833", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:C\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-11-22T19:29:03.803", "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-8163\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2017-11-22T19:29:03.803\",\"lastModified\":\"2024-11-21T03:33:26.833\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"AR120-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR1200 with software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR1200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR150 with software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR150-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR160 with software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR200 with software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30,AR200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 with software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30,AR2200-S with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30,AR510 with software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30,NetEngine16EX with software V200R006C10, V200R007C00, V200R008C20, V200R008C30,SMC2.0 with software V100R003C10, V100R005C00, V500R002C00, V600R006C00,SRG1300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG2300 with software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30,SRG3300 with software V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send specially crafted message to the target device.Successful exploit of the vulnerability could cause out-of-bounds read and system crash.\"},{\"lang\":\"es\",\"value\":\"AR120-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR1200 con software V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR1200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR150 con software V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR150-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR160 con software V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR200 con software V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30; AR200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR2200 con software V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30; AR2200-S con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; AR3200 con software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30; AR510 con software V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30; NetEngine16EX con software V200R006C10, V200R007C00, V200R008C20, V200R008C30; SMC2.0 con software V100R003C10, V100R005C00, V500R002C00, V600R006C00; SRG1300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; SRG2300 con software V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30; y SRG3300 con software V200R006C10, V200R007C00, V200R008C20, V200R008C30 tienen una vulnerabilidad de lectura fuera de l\u00edmites. A causa de una validaci\u00f3n de entradas insuficiente, un atacante remoto autenticado podr\u00eda enviar un mensaje especialmente manipulado al dispositivo objetivo. Una explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda provocar una lectura fuera de l\u00edmites y el cierre inesperado del sistema.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:C\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9EC3BAF-54F8-4EEC-A99B-D8BD458EE638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD9E894-321E-4A61-9DA6-677042DDD739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DA91B4-77A6-4A37-8799-5E548184D49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42376C56-573F-4A88-B18E-43F636B17B41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CFDB51-BF44-4433-AB2A-CFF553F8D640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE416CD-53B5-4E08-BB30-682887740C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D6C34F-ED85-461D-89AF-3B8C439867FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334E0095-CF32-497D-85AC-AE8AEDE4EC50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4459EF03-890E-446E-8702-8F7CE499FB48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C623D44E-463B-49A3-81F8-AD219E035B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D89B2A9-5DE3-4822-BE2E-4C71447A4FFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4BA4150-8CA8-48BF-9D45-ABC8AC710060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB60F62-0715-4C1E-B352-A3D61B56E2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125153E-FE39-49A7-95AA-9482C78E7114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB071D6-18CE-4FC5-855E-01E64F15BD3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B053C248-3CC2-476D-95A7-90EDD8EAAD69\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D92A6F-B30C-4E09-91FC-9C7FFF375710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455D7A4E-523E-40C8-958D-59D128F3E797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3B0016-0A4A-471F-BBEA-D2E485587B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1B1393-1D47-448D-A5FF-0B2EF74CF172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B64AE02-D345-4628-A086-7C63C255707C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8DC83BF-B7AA-4654-95A2-54C43F379A9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"526371A8-11FE-4D00-AFBB-8E867A320B27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC8C3E-420F-49D1-9E58-98E4E23A024F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787AC5E3-CE88-491D-8211-BAB11112019D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868602DB-D063-4BE4-A02B-936433CD8231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A35FE7-D526-455A-934B-08D54A0302A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3D18A0-71EC-4B1E-89FC-9522F9A64ACA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A72083-717F-4C71-A2D7-62E1C64FEE94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAB93A84-773E-4DDF-B8B6-8705D2000CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF92D98E-60C8-43F9-B6F7-D43193D102EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CCEC64-BD07-49F7-8804-98A74257F060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685289C-08B1-43D4-9970-84A7FC75E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DBC628-F348-4204-B212-11E8E6A0AC8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137A007D-A498-483F-8B4F-DCA118B25F11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C77ADC-2511-4630-B5F5-F2991EA39E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622686BB-9302-449F-9351-75B189D1B184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5186D104-FD41-4F54-9923-25B0C8C09E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D139E125-0A75-4094-ABFD-A47DAE94CDC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2562CCF8-A4A7-4ACD-AA67-E3DB8B5ADA92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7114E20-407A-4B1C-9FCE-FF367B50E0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE9B95EB-A848-4311-8500-9C909784393E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE2EC4F9-EB14-4628-9F89-34168BBD6A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487D436-B96E-4781-AFFD-2136154F9166\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDFA4F2-3040-4355-B6E0-4F3B9FC2CDDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F042B27-F875-4BA3-9002-E5ADC544208B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC62ECA-1F47-4316-87F4-60E7E8FFCEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16pwe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD069FB1-8A7E-4D29-94F2-D7F94BA306D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F377CE1E-77A7-447F-B692-A54682A26BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF9B214-A3C7-4D4E-B92D-63E1085B76C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CCF46F-1B0F-4829-BB28-758777313451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FDAED9E-1B9F-42EA-A344-E50FA1ED609A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50662078-4827-4706-AE29-170E2239C5AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32119825-AF22-44AA-8D04-1FAACF9E2E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BC38B-D016-4E83-A14E-FE8575135DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897F931-00B2-4FDF-90CE-5077416E42BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EEE539-796F-4638-9EE1-0BC1BE25CA1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5862E1A5-0222-4059-B9D7-716A6D0EB8CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9A3444-A485-4B87-B910-F3DA5C8E5D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BE6310-A42C-4BB3-BB02-7CE6F4FF340D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0595B3AA-8911-44AF-996B-2F431517FBED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC727A7A-CF3D-4DC9-9083-A0CE8ED886A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A842B77-C902-4B20-A171-3F98C75E6160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC61DFB2-E24C-4148-892E-A14F1EC3F9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B01969DE-DC37-4F2F-BB9B-5242810A8317\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9309E1AA-0C4E-422C-9307-A8DD0AE5D576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A14BFE-B957-4BD9-AD25-01011BF9BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4072905-CA96-44F9-8868-BB20BDC56EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE13681-CF1A-4765-B35A-E6E674C334B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F77B216-3E00-4EC0-9BEB-6ACD322874C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F06D60-CC92-4B27-9248-40C9CD8EF000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F01709-8D14-4C0D-9990-0BC01AAEE1B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C579A9-2768-4202-9171-BC803554E923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EB46B1-A4FE-42AD-BA60-8134A34F5901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar510_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5C6B89-A46F-43C6-908B-FE5FBFB696BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD9E893-609B-4C97-82E6-0651AEC39D14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7A0E2C-8383-443D-8625-77CBC53D2140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F719A3F-2EEE-470B-B42B-0E4B7C7CBD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA500A69-F8E4-46A8-9B46-F318F9110C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51387999-E9D0-497F-A309-CA5E3126EB00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6224ECC-6949-4204-94D1-C7374C142A50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r003c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"386F5C31-6000-48C4-A9CA-D3F91A0549E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611E69A3-AB62-4584-B611-93583D84FCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E7481E-B5B8-481C-AC35-A8029AA2DF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E7CCC4-60A8-48FA-A9EA-7A327B3A29B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:smc2.0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBEFFB4-9742-48CC-BBA6-E5DCA281B343\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF1DFD2-5337-45CA-A1A9-2E6622536027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B319F31F-94D7-468F-8F71-96F40867AEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D882C1-BFE2-4C29-86FF-C10F86323D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C655B04-5CAD-4BA0-AD0D-658DBDD36D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32B9C4A-6005-4B82-B809-FF3DBF47C17B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF77FB70-AAF3-421E-8D9B-F0C54E6A2FC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D485D5E3-3819-4F3A-B841-ACB6253ACF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E2E7D1-1F41-4EB2-9401-A3C4F988D64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140F2A04-2F59-4BD7-9FCE-E37E4FAAF5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0AF0C0-46BF-4984-8378-954DF82EE227\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BAF601C-B8EC-42F5-95F4-274F8492F57E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"309B9B0E-3639-4913-9DE4-9D4DAE6B0065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E497D97B-F044-4F9A-84B0-378978FBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E57098-7E8D-4956-82E6-1474A50569C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43681AE7-5C12-4772-85A9-0A10177C6CFD\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171018-01-h323-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.