FKIE_CVE-2019-5232

Vulnerability from fkie_nvd - Published: 2019-11-29 20:15 - Updated: 2024-11-21 04:44
Summary
There is a use of insufficiently random values vulnerability in Huawei ViewPoint products. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak.
Impacted products
Vendor Product Version
huawei vp9630_firmware v500r002c00
huawei vp9630_firmware v500r002c10
huawei vp9630 -
huawei vp9650_firmware v500r002c00
huawei vp9650_firmware v500r002c10
huawei vp9650 -
huawei vp9660_firmware v500r002c00
huawei vp9660_firmware v500r002c10
huawei vp9660 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9630_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECEBAFE1-9E38-4424-A505-100A395BB9F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9630_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A4B6904-E2A0-41B9-8AF8-B298FB6F83FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9630:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47FDD1F2-BAA8-4133-A05D-C84063C1F270",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9650_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F23CEDE-F5AC-49DA-92BC-1F696810AA22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9650_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA56D2AB-D108-49B7-B1AE-A9EF1F88CF28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DBFBB5-2716-4816-ABA8-78B6C2D76668",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68709FF-9E1C-4174-A925-70A88D4376A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A58ED692-8BED-4877-9BC9-D41386B660C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC498B-F19F-403A-ACFE-F8364A78EC66",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a use of insufficiently random values vulnerability in Huawei ViewPoint products. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de uso de valores aleatorios de manera insuficiente en los productos Huawei ViewPoint. Un atacante remoto no autenticado puede adivinar informaci\u00f3n mediante un gran n\u00famero de intentos. Una explotaci\u00f3n con \u00e9xito puede causar un filtrado de informaci\u00f3n."
    }
  ],
  "id": "CVE-2019-5232",
  "lastModified": "2024-11-21T04:44:34.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-29T20:15:11.940",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191120-01-viewpoint-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191120-01-viewpoint-en"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-330"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…