cve-2019-5248
Vulnerability from cvelistv5
Published
2019-12-13 14:43
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | CloudEngine 12800 |
Version: V200R001C00SPC600 Version: V200R001C00SPC700 Version: V200R002C01 Version: V200R002C50SPC800 Version: V200R002C50SPC800PWE |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CloudEngine 12800", "vendor": "n/a", "versions": [ { "status": "affected", "version": "V200R001C00SPC600" }, { "status": "affected", "version": "V200R001C00SPC700" }, { "status": "affected", "version": "V200R002C01" }, { "status": "affected", "version": "V200R002C50SPC800" }, { "status": "affected", "version": "V200R002C50SPC800PWE" } ] } ], "descriptions": [ { "lang": "en", "value": "CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T14:43:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5248", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CloudEngine 12800", "version": { "version_data": [ { "version_value": "V200R001C00SPC600" }, { "version_value": "V200R001C00SPC700" }, { "version_value": "V200R002C01" }, { "version_value": "V200R002C50SPC800" }, { "version_value": "V200R002C50SPC800PWE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en", "refsource": "MISC", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5248", "datePublished": "2019-12-13T14:43:32", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc600:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1985052F-6452-46C7-8070-2CDB6FDF3803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc700:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA9CCEB1-6A35-4AE7-8F8D-EC137F663A85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A7B1A3E-5D5A-4E3A-89F1-73DA7FF0F060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A1D568-48C6-4CE4-8CD2-93F79F484448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800pwe:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30198A99-3F26-4A98-A001-633508FA0EF3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE8A2875-0F7E-4790-A925-5999396B7578\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device.\"}, {\"lang\": \"es\", \"value\": \"CloudEngine 12800 presenta una vulnerabilidad de DoS. Un atacante de un dispositivo vecino env\\u00eda una gran cantidad de paquetes espec\\u00edficos. Como resultado, se produce una p\\u00e9rdida de memoria despu\\u00e9s de que el dispositivo utiliza el paquete espec\\u00edfico. Como resultado, el atacante puede explotar esta vulnerabilidad para causar ataques de DoS en el dispositivo de destino.\"}]", "id": "CVE-2019-5248", "lastModified": "2024-11-21T04:44:36.163", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 6.1, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2019-12-13T15:15:11.193", "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-5248\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-12-13T15:15:11.193\",\"lastModified\":\"2024-11-21T04:44:36.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device.\"},{\"lang\":\"es\",\"value\":\"CloudEngine 12800 presenta una vulnerabilidad de DoS. Un atacante de un dispositivo vecino env\u00eda una gran cantidad de paquetes espec\u00edficos. Como resultado, se produce una p\u00e9rdida de memoria despu\u00e9s de que el dispositivo utiliza el paquete espec\u00edfico. Como resultado, el atacante puede explotar esta vulnerabilidad para causar ataques de DoS en el dispositivo de destino.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1985052F-6452-46C7-8070-2CDB6FDF3803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9CCEB1-6A35-4AE7-8F8D-EC137F663A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7B1A3E-5D5A-4E3A-89F1-73DA7FF0F060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A1D568-48C6-4CE4-8CD2-93F79F484448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800pwe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30198A99-3F26-4A98-A001-633508FA0EF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8A2875-0F7E-4790-A925-5999396B7578\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.