cve-2021-37127
Vulnerability from cvelistv5
Published
2021-10-27 00:31
Modified
2024-08-04 01:09
Severity ?
EPSS score ?
Summary
There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | iManager NetEco;iManager NetEco 6000 |
Version: V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300 Version: V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iManager NetEco;iManager NetEco 6000", "vendor": "n/a", "versions": [ { "status": "affected", "version": "V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300" }, { "status": "affected", "version": "V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Signature Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-27T00:31:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iManager NetEco;iManager NetEco 6000", "version": { "version_data": [ { "version_value": "V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300" }, { "version_value": "V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Signature Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37127", "datePublished": "2021-10-27T00:31:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2001:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57B9F1D8-043C-4F35-B82E-1B058A0E3E06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2002:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5179F24D-E60C-4E2B-A7B7-E449B1A23EB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"497DA2B2-A223-4DF4-8318-4D61A07DE89E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6EABC8D-CF29-4EE8-AB12-52FD319E0451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc120:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4868DB43-AAC0-4709-A624-5DEC440DC467\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF23C0E-13A5-4048-BEF5-327914421B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc210:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F4DC23A-5740-49FA-9357-31FD557A0CF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc300:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18F19C7B-95A2-4E09-ABC0-0CFA84C0085E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B8CFC69-D6E8-4163-AE0F-B85693F2555D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc100:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"485BDF37-6661-4BE6-9E8F-81789438BE9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E57422AB-3A4A-4607-BD5F-F2202DC98DBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc120:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A81E5DA2-A22D-4709-A6A1-BF1E9E4FE90F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc190:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E6BEE4A-AFD0-4618-8A0C-98FB34578924\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc200:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AEDC6F2-9B47-4CD7-922F-F1E44E70D3FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc201:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"369D1CB7-F518-4FDA-8B91-5175AEBF8A27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc202:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC7E8838-96CF-4ACF-A40A-11C89D2D3289\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc210:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BC54B6E-69E3-4DDD-B2C3-22159285DE83\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D96479E8-2B4F-4149-B61B-79ECD0524A01\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad en la administraci\\u00f3n de firmas en algunos productos de Huawei. Un atacante puede falsificar la firma y omitir la comprobaci\\u00f3n de la misma. Durante el proceso de actualizaci\\u00f3n del firmware, una explotaci\\u00f3n con \\u00e9xito de esta vulnerabilidad puede causar que el archivo de sistema forjado sobrescriba el archivo de sistema correcto. Las versiones de producto afectadas incluyen: iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300; iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210\"}]", "id": "CVE-2021-37127", "lastModified": "2024-11-21T06:14:41.860", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2021-10-27T01:15:07.710", "references": "[{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-347\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-37127\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2021-10-27T01:15:07.710\",\"lastModified\":\"2024-11-21T06:14:41.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad en la administraci\u00f3n de firmas en algunos productos de Huawei. Un atacante puede falsificar la firma y omitir la comprobaci\u00f3n de la misma. Durante el proceso de actualizaci\u00f3n del firmware, una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad puede causar que el archivo de sistema forjado sobrescriba el archivo de sistema correcto. Las versiones de producto afectadas incluyen: iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300; iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2001:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B9F1D8-043C-4F35-B82E-1B058A0E3E06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00cp2002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5179F24D-E60C-4E2B-A7B7-E449B1A23EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"497DA2B2-A223-4DF4-8318-4D61A07DE89E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EABC8D-CF29-4EE8-AB12-52FD319E0451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4868DB43-AAC0-4709-A624-5DEC440DC467\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF23C0E-13A5-4048-BEF5-327914421B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F4DC23A-5740-49FA-9357-31FD557A0CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_6000_firmware:v600r010c00spc300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F19C7B-95A2-4E09-ABC0-0CFA84C0085E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B8CFC69-D6E8-4163-AE0F-B85693F2555D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"485BDF37-6661-4BE6-9E8F-81789438BE9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57422AB-3A4A-4607-BD5F-F2202DC98DBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A81E5DA2-A22D-4709-A6A1-BF1E9E4FE90F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc190:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6BEE4A-AFD0-4618-8A0C-98FB34578924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AEDC6F2-9B47-4CD7-922F-F1E44E70D3FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc201:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369D1CB7-F518-4FDA-8B91-5175AEBF8A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc202:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7E8838-96CF-4ACF-A40A-11C89D2D3289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:imanager_neteco_firmware:v600r009c00spc210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC54B6E-69E3-4DDD-B2C3-22159285DE83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96479E8-2B4F-4149-B61B-79ECD0524A01\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.