cve-2018-7949
Vulnerability from cvelistv5
Published
2018-06-01 14:00
Modified
2024-08-05 06:37
Severity ?
EPSS score ?
Summary
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | 1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3 |
Version: 1288H V5 V100R005C00 Version: 2288H V5 V100R005C00 Version: 2488 V5 V100R005C00 Version: CH121 V3 V100R001C00 Version: CH121L V3 V100R001C00 Version: CH121L V5 V100R001C00 Version: CH121 V5 V100R001C00 Version: CH140 V3 V100R001C00 Version: CH140L V3 V100R001C00 Version: CH220 V3 V100R001C00 Version: CH222 V3 V100R001C00 Version: CH242 V3 V100R001C00 Version: CH242 V5 V100R001C00 Version: RH1288 V3 V100R003C00 Version: RH2288 V3 V100R003C00 Version: RH2288H V3 V100R003C00 Version: XH310 V3 V100R003C00 Version: XH321 V3 V100R003C00 Version: XH321 V5 V100R005C00 Version: XH620 V3 V100R003C00 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:37:59.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "1288H V5 V100R005C00" }, { "status": "affected", "version": "2288H V5 V100R005C00" }, { "status": "affected", "version": "2488 V5 V100R005C00" }, { "status": "affected", "version": "CH121 V3 V100R001C00" }, { "status": "affected", "version": "CH121L V3 V100R001C00" }, { "status": "affected", "version": "CH121L V5 V100R001C00" }, { "status": "affected", "version": "CH121 V5 V100R001C00" }, { "status": "affected", "version": "CH140 V3 V100R001C00" }, { "status": "affected", "version": "CH140L V3 V100R001C00" }, { "status": "affected", "version": "CH220 V3 V100R001C00" }, { "status": "affected", "version": "CH222 V3 V100R001C00" }, { "status": "affected", "version": "CH242 V3 V100R001C00" }, { "status": "affected", "version": "CH242 V5 V100R001C00" }, { "status": "affected", "version": "RH1288 V3 V100R003C00" }, { "status": "affected", "version": "RH2288 V3 V100R003C00" }, { "status": "affected", "version": "RH2288H V3 V100R003C00" }, { "status": "affected", "version": "XH310 V3 V100R003C00" }, { "status": "affected", "version": "XH321 V3 V100R003C00" }, { "status": "affected", "version": "XH321 V5 V100R005C00" }, { "status": "affected", "version": "XH620 V3 V100R003C00" } ] } ], "datePublic": "2018-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users." } ], "problemTypes": [ { "descriptions": [ { "description": "privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-01T13:57:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2018-7949", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1288H V5; 2288H V5; 2488 V5 ; CH121 V3; CH121L V3; CH121L V5 ; CH121 V5 ; CH140 V3; CH140L V3; CH220 V3; CH222 V3; CH242 V3; CH242 V5 ; RH1288 V3; RH2288 V3; RH2288H V3; XH310 V3; XH321 V3; XH321 V5; XH620 V3", "version": { "version_data": [ { "version_value": "1288H V5 V100R005C00" }, { "version_value": "2288H V5 V100R005C00" }, { "version_value": "2488 V5 V100R005C00" }, { "version_value": "CH121 V3 V100R001C00" }, { "version_value": "CH121L V3 V100R001C00" }, { "version_value": "CH121L V5 V100R001C00" }, { "version_value": "CH121 V5 V100R001C00" }, { "version_value": "CH140 V3 V100R001C00" }, { "version_value": "CH140L V3 V100R001C00" }, { "version_value": "CH220 V3 V100R001C00" }, { "version_value": "CH222 V3 V100R001C00" }, { "version_value": "CH242 V3 V100R001C00" }, { "version_value": "CH242 V5 V100R001C00" }, { "version_value": "RH1288 V3 V100R003C00" }, { "version_value": "RH2288 V3 V100R003C00" }, { "version_value": "RH2288H V3 V100R003C00" }, { "version_value": "XH310 V3 V100R003C00" }, { "version_value": "XH321 V3 V100R003C00" }, { "version_value": "XH321 V5 V100R005C00" }, { "version_value": "XH620 V3 V100R003C00" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2018-7949", "datePublished": "2018-06-01T14:00:00", "dateReserved": "2018-03-09T00:00:00", "dateUpdated": "2024-08-05T06:37:59.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:1288h_v5_firmware:100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970A03A9-3BD3-47CB-AE3E-DC6C354BB900\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A97FE467-E5EB-45B4-B7EA-2E8232307CEE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:2288h_v5_firmware:100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6CF6E61-7CF1-4CEF-9282-17102E56B38E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E01F546-8E5E-4A5A-B921-DF985FF1D7ED\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:2488_v5_firmware:100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D757021-44CA-4B8D-A194-7B0DEE47E5B1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8494E22-C84A-4201-96A3-02D8CBAC7C02\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch121_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5283ACDA-CCB2-47F6-BCB6-5085E93B9F6F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FF9E151-2924-47F8-A20B-E413C548F9AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch121l_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ACA0F25-613F-4D42-B634-6B7D3E57E3F4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58588D8E-57C2-466C-96DD-B7F679AC7EA7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch121l_v5_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57EFD6C9-5A39-4D9A-824E-6DD1B51C47D8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch121l_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F9F3B0F-41E5-4846-B572-5EDB4BAE50F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch121_v5_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57A7E8BA-EF5A-4103-BF2E-0118FB53535E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch121_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48D2E997-5EC8-46F3-9AC9-B06A01FBBF92\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch140_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4B2CB6B-D216-4239-A023-5A22CDB17863\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch140_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0C4EBB9-35CB-4EA3-80AA-005785806CB8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch140l_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"955D2776-0288-4B9F-B7F1-246A857DEAA8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch140l_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEF1B2D3-C978-4014-8FE6-1A39BCBA0F34\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch220_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4929308D-56EE-4A2E-BD4A-8200A9D5BF8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch220_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6D24534-B42F-48F4-8E04-5C6CFD64C4B1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch222_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30660352-38A5-455D-8779-35343DD44DE1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch222_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69FEA658-EC41-4E35-B36D-42C4770E44ED\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch242_v3_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E85B51FC-9C85-4B5C-B544-40D1B02F06EC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2637E43-1937-4320-AAF4-3770C332B66E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ch242_v5_firmware:100r001c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2BAC240-B572-4BB3-B807-0B55BFCD2164\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ch242_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F38C6CB2-4851-43E9-B608-99857AEEE900\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:rh1288_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"453060FA-4F69-44F2-8DD5-CDCFEEA50A19\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:rh1288_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20F56E3-3F39-4038-9918-96F1EAB82A85\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:rh2288_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D20D0CB7-84E0-4CE7-8F0D-51F44C967F79\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:rh2288_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24C453A0-D125-4152-A8BF-E369F7D48322\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:xh310_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D014565-6F10-4A2D-AA6B-1BDDD3CDD8FD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:xh310_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8823E10A-ADA2-4364-A4F3-A0BCD64DACC3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:xh321_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"271064EB-1DC1-405F-88F5-A8F72270116E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:xh321_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC29DFDD-8B50-48FC-9700-BDF766B6986B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:xh321_v5_firmware:100r005c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70E83CF9-5D63-4D4B-AFD8-FAD77A48DF1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:xh321_v5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62587B2F-1C9F-4BE5-8E4B-8713ACAA0AA1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:rh2288h_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03777710-8412-4675-A98F-E19AC1C0FFF0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:rh2288h_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A0B7D22-4BCE-4BF0-9738-8EBEEB9ED643\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:xh620_v3_firmware:100r003c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79316C79-B48D-4FC6-BD8A-29350FB12234\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:xh620_v3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA54C1AF-8F77-4D40-B938-38887782D3AF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.\"}, {\"lang\": \"es\", \"value\": \"iBMC (Intelligent Baseboard Management Controller) en algunos servidores Huawei tiene una vulnerabilidad de escalado de privilegios. Un atacante remoto no autenticado podr\\u00eda enviar algunos mensajes de inicio de sesi\\u00f3n especialmente manipulados a los productos afectados. Debido al dise\\u00f1o de autenticaci\\u00f3n incorrecto, su explotaci\\u00f3n exitosa permitir que usuarios con bajos privilegios obtengan o modifiquen contrase\\u00f1as de usuarios con muchos privilegios.\"}]", "id": "CVE-2018-7949", "lastModified": "2024-11-21T04:13:00.580", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:N\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-06-01T14:29:00.787", "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2018-7949\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2018-06-01T14:29:00.787\",\"lastModified\":\"2024-11-21T04:13:00.580\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a privilege escalation vulnerability. A remote attacker may send some specially crafted login messages to the affected products. Due to improper authentication design, successful exploit enables low privileged users to get or modify passwords of highly privileged users.\"},{\"lang\":\"es\",\"value\":\"iBMC (Intelligent Baseboard Management Controller) en algunos servidores Huawei tiene una vulnerabilidad de escalado de privilegios. Un atacante remoto no autenticado podr\u00eda enviar algunos mensajes de inicio de sesi\u00f3n especialmente manipulados a los productos afectados. Debido al dise\u00f1o de autenticaci\u00f3n incorrecto, su explotaci\u00f3n exitosa permitir que usuarios con bajos privilegios obtengan o modifiquen contrase\u00f1as de usuarios con muchos privilegios.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:1288h_v5_firmware:100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970A03A9-3BD3-47CB-AE3E-DC6C354BB900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97FE467-E5EB-45B4-B7EA-2E8232307CEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:2288h_v5_firmware:100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CF6E61-7CF1-4CEF-9282-17102E56B38E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E01F546-8E5E-4A5A-B921-DF985FF1D7ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:2488_v5_firmware:100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D757021-44CA-4B8D-A194-7B0DEE47E5B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8494E22-C84A-4201-96A3-02D8CBAC7C02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch121_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5283ACDA-CCB2-47F6-BCB6-5085E93B9F6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FF9E151-2924-47F8-A20B-E413C548F9AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch121l_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACA0F25-613F-4D42-B634-6B7D3E57E3F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58588D8E-57C2-466C-96DD-B7F679AC7EA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch121l_v5_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57EFD6C9-5A39-4D9A-824E-6DD1B51C47D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch121l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9F3B0F-41E5-4846-B572-5EDB4BAE50F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch121_v5_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A7E8BA-EF5A-4103-BF2E-0118FB53535E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch121_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D2E997-5EC8-46F3-9AC9-B06A01FBBF92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch140_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B2CB6B-D216-4239-A023-5A22CDB17863\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch140_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C4EBB9-35CB-4EA3-80AA-005785806CB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch140l_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955D2776-0288-4B9F-B7F1-246A857DEAA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch140l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF1B2D3-C978-4014-8FE6-1A39BCBA0F34\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch220_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4929308D-56EE-4A2E-BD4A-8200A9D5BF8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D24534-B42F-48F4-8E04-5C6CFD64C4B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch222_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30660352-38A5-455D-8779-35343DD44DE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch222_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69FEA658-EC41-4E35-B36D-42C4770E44ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch242_v3_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85B51FC-9C85-4B5C-B544-40D1B02F06EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2637E43-1937-4320-AAF4-3770C332B66E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ch242_v5_firmware:100r001c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2BAC240-B572-4BB3-B807-0B55BFCD2164\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ch242_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38C6CB2-4851-43E9-B608-99857AEEE900\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rh1288_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"453060FA-4F69-44F2-8DD5-CDCFEEA50A19\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:rh1288_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20F56E3-3F39-4038-9918-96F1EAB82A85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rh2288_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D20D0CB7-84E0-4CE7-8F0D-51F44C967F79\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:rh2288_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C453A0-D125-4152-A8BF-E369F7D48322\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:xh310_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D014565-6F10-4A2D-AA6B-1BDDD3CDD8FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:xh310_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8823E10A-ADA2-4364-A4F3-A0BCD64DACC3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:xh321_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"271064EB-1DC1-405F-88F5-A8F72270116E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:xh321_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC29DFDD-8B50-48FC-9700-BDF766B6986B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:xh321_v5_firmware:100r005c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E83CF9-5D63-4D4B-AFD8-FAD77A48DF1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:xh321_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62587B2F-1C9F-4BE5-8E4B-8713ACAA0AA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rh2288h_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03777710-8412-4675-A98F-E19AC1C0FFF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:rh2288h_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0B7D22-4BCE-4BF0-9738-8EBEEB9ED643\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:xh620_v3_firmware:100r003c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79316C79-B48D-4FC6-BD8A-29350FB12234\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:xh620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA54C1AF-8F77-4D40-B938-38887782D3AF\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180530-03-server-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.