cve-2019-5300
Vulnerability from cvelistv5
Published
2019-06-04 18:30
Modified
2024-08-04 19:54
Severity ?
Summary
There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:54:52.437Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300, SRG3300",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "AR1200 V200R008C50"
            },
            {
              "status": "affected",
              "version": "AR1200 V200R009C00"
            },
            {
              "status": "affected",
              "version": "AR1200 V200R010C00"
            },
            {
              "status": "affected",
              "version": "AR1200-S V200R007C00"
            },
            {
              "status": "affected",
              "version": "AR1200-S V200R008C20"
            },
            {
              "status": "affected",
              "version": "AR1200-S V200R008C50"
            },
            {
              "status": "affected",
              "version": "AR1200-S V200R009C00"
            },
            {
              "status": "affected",
              "version": "AR1200-S V200R010C00"
            },
            {
              "status": "affected",
              "version": "AR150 V200R007C00"
            },
            {
              "status": "affected",
              "version": "AR150 V200R008C20"
            },
            {
              "status": "affected",
              "version": "AR150 V200R008C50"
            },
            {
              "status": "affected",
              "version": "AR150 V200R009C00"
            },
            {
              "status": "affected",
              "version": "AR150 V200R010C00"
            },
            {
              "status": "affected",
              "version": "AR160 V200R007C00"
            },
            {
              "status": "affected",
              "version": "AR160 V200R008C20"
            },
            {
              "status": "affected",
              "version": "AR160 V200R008C50"
            },
            {
              "status": "affected",
              "version": "AR160 V200R009C00"
            }
          ]
        }
      ],
      "datePublic": "2019-03-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "digital signature verification bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-04T18:30:58",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5300",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300, SRG3300",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AR1200 V200R008C50"
                          },
                          {
                            "version_value": "AR1200 V200R009C00"
                          },
                          {
                            "version_value": "AR1200 V200R010C00"
                          },
                          {
                            "version_value": "AR1200-S V200R007C00"
                          },
                          {
                            "version_value": "AR1200-S V200R008C20"
                          },
                          {
                            "version_value": "AR1200-S V200R008C50"
                          },
                          {
                            "version_value": "AR1200-S V200R009C00"
                          },
                          {
                            "version_value": "AR1200-S V200R010C00"
                          },
                          {
                            "version_value": "AR150 V200R007C00"
                          },
                          {
                            "version_value": "AR150 V200R008C20"
                          },
                          {
                            "version_value": "AR150 V200R008C50"
                          },
                          {
                            "version_value": "AR150 V200R009C00"
                          },
                          {
                            "version_value": "AR150 V200R010C00"
                          },
                          {
                            "version_value": "AR160 V200R007C00"
                          },
                          {
                            "version_value": "AR160 V200R008C20"
                          },
                          {
                            "version_value": "AR160 V200R008C50"
                          },
                          {
                            "version_value": "AR160 V200R009C00"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "digital signature verification bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5300",
    "datePublished": "2019-06-04T18:30:58",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:54:52.437Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C623D44E-463B-49A3-81F8-AD219E035B09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75E27982-56E6-4A6F-9124-34C7420FDDE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EB8B580-EF85-44FE-A7A1-455CD5A7BF85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3202830A-D5CF-411F-B94A-167576919F38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1200e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8F6BA3-E2C0-410D-A5E5-6E95545E5467\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1220c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC75BE34-DC7C-45F3-8F19-F703EF4D5982\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1220ev:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"141A9CA7-59A5-4BA4-A7A7-C876A4426C00\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1220evw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14DAC925-7F20-45B9-B753-B7F0EEE3C7F1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D125153E-FE39-49A7-95AA-9482C78E7114\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF226F5B-7BF8-4475-8C0C-91E2E43C6E53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FE54D66-BE3A-492D-B381-4E63880D8088\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar1200-s_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6BF5574-175F-4438-A1D1-0EAA8280388B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar1220f-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B043BAD-75CD-4D7B-BA3C-118519B64A39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455D7A4E-523E-40C8-958D-59D128F3E797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B64AE02-D345-4628-A086-7C63C255707C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25AB058D-C4EB-416F-ACD3-B6ACC2BD83AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"411499D2-DD34-4131-8310-0CCC351D28F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar150_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A87F4819-180D-488B-B8D8-C10B5076F9AB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar158evw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37D521BD-2D68-494F-ADF3-CA836A9860FE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A685289C-08B1-43D4-9970-84A7FC75E54B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D609298-9ACE-4726-AD04-6765D8F2C374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A07BC16A-C102-4B21-BF61-C7AE1452BA3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar160_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75124BF8-A5FC-46BB-83CF-0C2B7CF92F1B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A206CEBA-27BF-4F73-9E16-DEC0B305BB9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161ew:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ABF308C-9C4F-4C1E-ADD6-969CDF656BE9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE33C6C9-87F8-42DC-89B1-7C3F5CDFE32E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161f-dgp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B19316A6-DDB7-4181-9373-30DDF532E203\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161fg-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4917007C-227B-4F1D-AA58-76487A00DF87\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161fgw-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB72AFF6-A296-497D-83D4-5C700FE9D635\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161fv-1p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3AD4730-5311-4477-8E10-421BE84912F6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161fw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E39599B-F0F7-4BB8-9E02-91D470995EF5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161g-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99F89646-40DE-499F-9588-4FC7C13D1CCD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar161w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7EF0D65-C352-495A-8DD5-78AC66E8480C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar168f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0124D47-B343-45AD-A06F-9A186A499F84\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar168f-4p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"663A08C1-0F99-4050-A6DA-0081827283C6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B2734E4-B511-4C70-9B5F-8DA0A9963E26\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169egw-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCACD162-8331-47CF-9F77-F71221565AFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169ew:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAAA155B-34BF-4F75-924D-FAB6601FCD46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58721B8C-8A6F-4889-B3D1-6433AB485E40\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169fgw-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA425686-6C6C-4ADB-AC8A-D7FE924E340E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169fvw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81601B04-7FC6-4776-9EBC-3C825DA1B7F7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169fvw-8s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1772765A-EE39-4AC0-A6BA-B79AC5D93A8A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169g-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B739B694-237A-4AF2-8A0E-63F902DFB656\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169jfvw-2s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99BD1519-AF5F-460F-90D6-4FF9CB7CD9EB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar169w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70E1AE34-BEDD-437A-B1F0-606AF4409893\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"622686BB-9302-449F-9351-75B189D1B184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1ED9DF8-A444-4684-932D-12B4B2F98736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06FB07B-D74B-42A8-9CE7-CD3FC7217F11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar200_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0924BB8D-A8A8-4F0F-9CE7-198B399E0685\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar201:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF8E24FB-1DD4-4DD8-8221-129C30C65E45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F377CE1E-77A7-447F-B692-A54682A26BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64CC27CC-EE60-46DE-91CE-6C83AF1F7B3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5658BAA0-3FCC-4DCB-BDD1-42D00263B29D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"158BF3D7-0195-4E73-A8A9-4536216C3CD0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2204-27ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1CACBBC-327A-40A6-9DD1-49335B296238\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2204-27ge-p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9079BB36-E42F-49D6-94D2-D9650A4C3E5C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2204-51ge-p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E128F1C9-577C-4F4A-B98B-AB268F703DB2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2204e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A614397B-C24D-4D69-B84A-05FBBC6AFC23\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2204xe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67725998-BDD7-4624-8A9F-6CC594293B14\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2220e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CC3FEDF-D877-400A-AE16-7EA1C82E042E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2240:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BD5CAC3-80C9-484D-B715-55FEC0543554\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2240c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C570769A-B882-4AB9-A6AC-381020A6BCA1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200s_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86D6EF09-27A6-493B-BDC6-D6C3AA7DB825\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200s_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59E43441-15B2-4EE0-AB87-6004BA6DD6C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200s_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"078ED368-3950-49D1-BC31-523B83165EF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200s_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2639415-69D4-44E5-BDB5-28B3E09117A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar2200s_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F7032EF-10C2-4E24-96F7-DEC39F7A1363\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar2200s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BC03A9-BBAE-4712-AC58-0338EB572EBA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9752658E-3CF5-4D9E-98FB-D15FD892479C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FD70804-3A07-4C82-806B-5F5CA075ABF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73E5EE31-3D31-4C59-B2C1-B0BCF3294D9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:ar3200_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A5BCC5C-CDFB-4B52-8E2D-E85BEC28FD2A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:ar3260:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3898C07-F3A3-4C40-95EE-C2F524C5EB31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B319F31F-94D7-468F-8F71-96F40867AEA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D578E607-CF83-4121-8AF9-EF1DBE5FE42F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65DEB87D-8F28-4AC6-9ADC-E13146011102\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg1300_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B68CB9B0-C32C-4EC5-81D0-ED23DB6D8EC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg1320vw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B98B6177-EFAF-493E-B02B-AE6095A1452F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D672376C-4256-4CFB-A515-56E31A6706AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8486420-C7CA-4296-A9B8-E4DDC1A23530\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg2300_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EB2C78B-0736-4AA2-A283-AD4441D7EBEA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg2320e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93EAE9D3-6A9E-4E4F-9550-79EB303A5A83\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43BAC724-4E88-4E3B-9F95-8086D68CADA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r009c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10511D02-503D-43AD-8306-FA1E9A52B8C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:srg3300_firmware:v200r010c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A05A3FA6-0B32-40A2-BCCE-4395B3DCB2DB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:srg3340:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CA1C39E-E679-4EF4-8BF4-D1B46DD614E9\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de omisi\\u00f3n de verificaci\\u00f3n de firma digital en los routers Huawei AR1200, AR1200-S, AR150, AR160, AR20000, AR2200-S, AR3200, SRG1300, SRG2300 y SRG3300. La vulnerabilidad se debe a que el software afectado verifica incorrectamente las firmas digitales de la imagen del software en el dispositivo afectado. Un atacante local con alto privilegio puede aprovechar la vulnerabilidad para omitir las comprobaciones de integridad de las im\\u00e1genes de software e instalar una imagen de software malintencionado en el dispositivo afectado.\"}]",
      "id": "CVE-2019-5300",
      "lastModified": "2024-11-21T04:44:42.073",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-06-04T19:29:00.633",
      "references": "[{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-347\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-5300\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-06-04T19:29:00.633\",\"lastModified\":\"2024-11-21T04:44:42.073\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a digital signature verification bypass vulnerability in AR1200, AR1200-S, AR150, AR160, AR200, AR2200, AR2200-S, AR3200, SRG1300, SRG2300 and SRG3300 Huawei routers. The vulnerability is due to the affected software improperly verifying digital signatures for the software image in the affected device. A local attacker with high privilege may exploit the vulnerability to bypass integrity checks for software images and install a malicious software image on the affected device.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de omisi\u00f3n de verificaci\u00f3n de firma digital en los routers Huawei AR1200, AR1200-S, AR150, AR160, AR20000, AR2200-S, AR3200, SRG1300, SRG2300 y SRG3300. La vulnerabilidad se debe a que el software afectado verifica incorrectamente las firmas digitales de la imagen del software en el dispositivo afectado. Un atacante local con alto privilegio puede aprovechar la vulnerabilidad para omitir las comprobaciones de integridad de las im\u00e1genes de software e instalar una imagen de software malintencionado en el dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64071E5-6ACD-4E51-9162-B0FF3DC08E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C623D44E-463B-49A3-81F8-AD219E035B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75E27982-56E6-4A6F-9124-34C7420FDDE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB8B580-EF85-44FE-A7A1-455CD5A7BF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3202830A-D5CF-411F-B94A-167576919F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1200e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8F6BA3-E2C0-410D-A5E5-6E95545E5467\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1220c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC75BE34-DC7C-45F3-8F19-F703EF4D5982\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1220ev:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141A9CA7-59A5-4BA4-A7A7-C876A4426C00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1220evw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14DAC925-7F20-45B9-B753-B7F0EEE3C7F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D125153E-FE39-49A7-95AA-9482C78E7114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0C5EF2-05D5-4DE5-AFA3-5394E51B33E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF226F5B-7BF8-4475-8C0C-91E2E43C6E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE54D66-BE3A-492D-B381-4E63880D8088\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar1200-s_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6BF5574-175F-4438-A1D1-0EAA8280388B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar1220f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B043BAD-75CD-4D7B-BA3C-118519B64A39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455D7A4E-523E-40C8-958D-59D128F3E797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B64AE02-D345-4628-A086-7C63C255707C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AB058D-C4EB-416F-ACD3-B6ACC2BD83AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"411499D2-DD34-4131-8310-0CCC351D28F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar150_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A87F4819-180D-488B-B8D8-C10B5076F9AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar158evw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D521BD-2D68-494F-ADF3-CA836A9860FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B15E8B7-9F4B-45F1-B4FF-B32AF8CEA9FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A685289C-08B1-43D4-9970-84A7FC75E54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D609298-9ACE-4726-AD04-6765D8F2C374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07BC16A-C102-4B21-BF61-C7AE1452BA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar160_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75124BF8-A5FC-46BB-83CF-0C2B7CF92F1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A206CEBA-27BF-4F73-9E16-DEC0B305BB9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161ew:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABF308C-9C4F-4C1E-ADD6-969CDF656BE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE33C6C9-87F8-42DC-89B1-7C3F5CDFE32E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161f-dgp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B19316A6-DDB7-4181-9373-30DDF532E203\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161fg-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4917007C-227B-4F1D-AA58-76487A00DF87\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161fgw-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB72AFF6-A296-497D-83D4-5C700FE9D635\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161fv-1p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3AD4730-5311-4477-8E10-421BE84912F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161fw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E39599B-F0F7-4BB8-9E02-91D470995EF5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161g-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99F89646-40DE-499F-9588-4FC7C13D1CCD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar161w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EF0D65-C352-495A-8DD5-78AC66E8480C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar168f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0124D47-B343-45AD-A06F-9A186A499F84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar168f-4p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663A08C1-0F99-4050-A6DA-0081827283C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2734E4-B511-4C70-9B5F-8DA0A9963E26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169egw-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCACD162-8331-47CF-9F77-F71221565AFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169ew:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAAA155B-34BF-4F75-924D-FAB6601FCD46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58721B8C-8A6F-4889-B3D1-6433AB485E40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169fgw-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA425686-6C6C-4ADB-AC8A-D7FE924E340E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169fvw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81601B04-7FC6-4776-9EBC-3C825DA1B7F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169fvw-8s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1772765A-EE39-4AC0-A6BA-B79AC5D93A8A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169g-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B739B694-237A-4AF2-8A0E-63F902DFB656\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169jfvw-2s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BD1519-AF5F-460F-90D6-4FF9CB7CD9EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar169w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E1AE34-BEDD-437A-B1F0-606AF4409893\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622686BB-9302-449F-9351-75B189D1B184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344D64D1-A9B3-4BFA-ACF3-B421ED427A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ED9DF8-A444-4684-932D-12B4B2F98736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06FB07B-D74B-42A8-9CE7-CD3FC7217F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar200_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0924BB8D-A8A8-4F0F-9CE7-198B399E0685\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF8E24FB-1DD4-4DD8-8221-129C30C65E45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F377CE1E-77A7-447F-B692-A54682A26BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A7DDB3-4A2B-46A5-B952-F0FECF88373E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CC27CC-EE60-46DE-91CE-6C83AF1F7B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5658BAA0-3FCC-4DCB-BDD1-42D00263B29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158BF3D7-0195-4E73-A8A9-4536216C3CD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2204-27ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1CACBBC-327A-40A6-9DD1-49335B296238\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2204-27ge-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9079BB36-E42F-49D6-94D2-D9650A4C3E5C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2204-51ge-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E128F1C9-577C-4F4A-B98B-AB268F703DB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2204e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A614397B-C24D-4D69-B84A-05FBBC6AFC23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2204xe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67725998-BDD7-4624-8A9F-6CC594293B14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2220e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC3FEDF-D877-400A-AE16-7EA1C82E042E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD5CAC3-80C9-484D-B715-55FEC0543554\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2240c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C570769A-B882-4AB9-A6AC-381020A6BCA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200s_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D6EF09-27A6-493B-BDC6-D6C3AA7DB825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200s_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E43441-15B2-4EE0-AB87-6004BA6DD6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200s_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"078ED368-3950-49D1-BC31-523B83165EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200s_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2639415-69D4-44E5-BDB5-28B3E09117A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar2200s_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7032EF-10C2-4E24-96F7-DEC39F7A1363\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar2200s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BC03A9-BBAE-4712-AC58-0338EB572EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9752658E-3CF5-4D9E-98FB-D15FD892479C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D0F6C6-5A87-482B-8B2A-693AC7736CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD70804-3A07-4C82-806B-5F5CA075ABF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E5EE31-3D31-4C59-B2C1-B0BCF3294D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:ar3200_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A5BCC5C-CDFB-4B52-8E2D-E85BEC28FD2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:ar3260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3898C07-F3A3-4C40-95EE-C2F524C5EB31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B319F31F-94D7-468F-8F71-96F40867AEA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D578E607-CF83-4121-8AF9-EF1DBE5FE42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65DEB87D-8F28-4AC6-9ADC-E13146011102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg1300_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B68CB9B0-C32C-4EC5-81D0-ED23DB6D8EC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg1320vw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98B6177-EFAF-493E-B02B-AE6095A1452F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EBBF2-8F03-472C-96DB-C72E426E4E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D672376C-4256-4CFB-A515-56E31A6706AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8486420-C7CA-4296-A9B8-E4DDC1A23530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg2300_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB2C78B-0736-4AA2-A283-AD4441D7EBEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg2320e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93EAE9D3-6A9E-4E4F-9550-79EB303A5A83\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4619CF2C-AB5D-475A-ACF6-61EE02306F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43BAC724-4E88-4E3B-9F95-8086D68CADA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r009c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10511D02-503D-43AD-8306-FA1E9A52B8C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:srg3300_firmware:v200r010c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05A3FA6-0B32-40A2-BCCE-4395B3DCB2DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:srg3340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA1C39E-E679-4EF4-8BF4-D1B46DD614E9\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-ar-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.