FKIE_CVE-2015-6586
Vulnerability from fkie_nvd - Published: 2017-05-23 04:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
The mDNS module in Huawei WLAN AC6005, AC6605, and ACU2 devices with software before V200R006C00SPC100 allows remote attackers to obtain sensitive information by leveraging failure to restrict processing of mDNS unicast queries to the link local network.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/76684 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-453516.htm | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76684 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-453516.htm | Mitigation, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | wlan_acu2_firmware | * | |
| huawei | wlan_acu2_firmware | * | |
| huawei | wlan_acu2_firmware | * | |
| huawei | wlan_acu2 | - | |
| huawei | wlan_ac6005_firmware | * | |
| huawei | wlan_ac6005_firmware | * | |
| huawei | wlan_ac6005_firmware | * | |
| huawei | wlan_ac6005 | - | |
| huawei | wlan_ac6605_firmware | * | |
| huawei | wlan_ac6605_firmware | * | |
| huawei | wlan_ac6605_firmware | * | |
| huawei | wlan_ac6605 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:wlan_acu2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79EBBF2D-21E0-4522-AEFA-200D98D41005",
"versionEndIncluding": "v200r005c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_acu2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF40F44B-0E72-43CD-AB35-B8BD7D5F1FD0",
"versionEndIncluding": "v200r005c10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_acu2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "159B9CFE-8A92-4CC8-9CCF-E7674F986847",
"versionEndIncluding": "v200r006c00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:wlan_acu2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9401915-9621-4C43-A668-E7F0B1487A29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6005_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1F7E9B-BDA9-450C-9348-257813582430",
"versionEndIncluding": "v200r005c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6005_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC967F4-09EB-487A-B0E5-B2B149849FFC",
"versionEndIncluding": "v200r005c10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6005_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64A7156E-6B22-4F08-9D1B-672643F7F4EB",
"versionEndIncluding": "v200r006c00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:wlan_ac6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF84D689-7852-4441-B73C-D0A7FA9A4E6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF72A36-5C8A-4258-80F4-6FA738678F90",
"versionEndIncluding": "v200r005c00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6254167-703A-42E4-ACA8-702F8DE0D2CF",
"versionEndIncluding": "v200r005c10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:wlan_ac6605_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89575912-488F-4ED0-9F69-453AC674A926",
"versionEndIncluding": "v200r006c00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:wlan_ac6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "251596D6-98C5-4CDF-9808-177AD2E51C15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The mDNS module in Huawei WLAN AC6005, AC6605, and ACU2 devices with software before V200R006C00SPC100 allows remote attackers to obtain sensitive information by leveraging failure to restrict processing of mDNS unicast queries to the link local network."
},
{
"lang": "es",
"value": "El m\u00f3dulo mDNS en los dispositivos Huawei WLAN AC6005, AC6605 y ACU2 con software anterior al V200R006C00SPC100, permite a atacantes remotos obtener informaci\u00f3n sensible aprovechando el fallo para restringir el procesamiento de consultas mDNS unicast a la red local del enlace.."
}
],
"id": "CVE-2015-6586",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-23T04:29:00.963",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/76684"
},
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-453516.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/76684"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-453516.htm"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…