FKIE_CVE-2019-5248
Vulnerability from fkie_nvd - Published: 2019-12-13 15:15 - Updated: 2024-11-21 04:44
Severity ?
Summary
CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | cloudengine_12800_firmware | v200r001c00spc600 | |
| huawei | cloudengine_12800_firmware | v200r001c00spc700 | |
| huawei | cloudengine_12800_firmware | v200r002c01 | |
| huawei | cloudengine_12800_firmware | v200r002c50spc800 | |
| huawei | cloudengine_12800_firmware | v200r002c50spc800pwe | |
| huawei | cloudengine_12800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc600:*:*:*:*:*:*:*",
"matchCriteriaId": "1985052F-6452-46C7-8070-2CDB6FDF3803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc700:*:*:*:*:*:*:*",
"matchCriteriaId": "CA9CCEB1-6A35-4AE7-8F8D-EC137F663A85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c01:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7B1A3E-5D5A-4E3A-89F1-73DA7FF0F060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A1D568-48C6-4CE4-8CD2-93F79F484448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800pwe:*:*:*:*:*:*:*",
"matchCriteriaId": "30198A99-3F26-4A98-A001-633508FA0EF3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8A2875-0F7E-4790-A925-5999396B7578",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CloudEngine 12800 has a DoS vulnerability. An attacker of a neighboring device sends a large number of specific packets. As a result, a memory leak occurs after the device uses the specific packet. As a result, the attacker can exploit this vulnerability to cause DoS attacks on the target device."
},
{
"lang": "es",
"value": "CloudEngine 12800 presenta una vulnerabilidad de DoS. Un atacante de un dispositivo vecino env\u00eda una gran cantidad de paquetes espec\u00edficos. Como resultado, se produce una p\u00e9rdida de memoria despu\u00e9s de que el dispositivo utiliza el paquete espec\u00edfico. Como resultado, el atacante puede explotar esta vulnerabilidad para causar ataques de DoS en el dispositivo de destino."
}
],
"id": "CVE-2019-5248",
"lastModified": "2024-11-21T04:44:36.163",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-13T15:15:11.193",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-dos-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…