Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-w25x-j7hc-vxvg
Vulnerability from github
Published
2022-05-24 17:03
Modified
2022-05-24 17:03
Details
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
{ "affected": [], "aliases": [ "CVE-2019-5254" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-12-13T23:15:00Z", "severity": "MODERATE" }, "details": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.", "id": "GHSA-w25x-j7hc-vxvg", "modified": "2022-05-24T17:03:40Z", "published": "2022-05-24T17:03:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5254" }, { "type": "WEB", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en" } ], "schema_version": "1.4.0", "severity": [] }
cve-2019-5254
Vulnerability from cvelistv5
Published
2019-12-13 22:51
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981 |
Version: V200R005C30 Version: V200R006C10 Version: V200R006C20 Version: V200R007C10 Version: V200R007C20 Version: V200R008C00 Version: V200R008C10 Version: V200R009C00 Version: V500R001C00SPC300 Version: V500R001C00SPC500 Version: V500R001C00SPH303 Version: V500R001C00SPH508 Version: V500R001C20 Version: V500R001C20SPC100 Version: V500R001C20SPC100PWE Version: V500R001C20SPC200 Version: V500R001C20SPC200B062 Version: V500R001C20SPC200PWE Version: V500R001C20SPC300B078 Version: V500R001C20SPC300PWE Version: V500R001C30 Version: V500R001C30SPC100 Version: V500R001C30SPC100PWE Version: V500R001C30SPC200 Version: V500R001C30SPC200PWE Version: V500R001C30SPC300 Version: V500R001C50 Version: V500R001C50PWE Version: V500R001C80 Version: V500R005C00 Version: V500R001C00SPC500PWE Version: V500R002C00 Version: V500R002C00SPC100 Version: V500R002C00SPC100PWE Version: V500R002C00SPC200 Version: V500R002C00SPC200PWE Version: V500R002C00SPC300 Version: V500R002C10 Version: V500R002C10PWE Version: V500R002C30 Version: V500R002C30PWE Version: V200R005C03 Version: V200R003C00SPC100 Version: V500R002C20 Version: V500R001C00 Version: V500R001C00SPC200 Version: V500R001C00SPC600 Version: V500R001C00SPC700 Version: V500R001C20SPC300 Version: V500R001C20SPC500 Version: V500R001C20SPC600 Version: V500R001C60SPC100 Version: V500R001C60SPC101 Version: V500R001C60SPC200 Version: V500R001C60SPC300 Version: V500R001C60SPC500 Version: V500R001C60SPC600 Version: V500R005C00SPC100 Version: V100R001C20SPC100 Version: V500R001C20SPC101 Version: V500R001C80PWE Version: V100R001C00SPC200 Version: V100R001C10SPC200 Version: V100R001C10SPC201 Version: V100R001C20SPC200 Version: V500R001C00SPC050 Version: V500R001C00SPC090 Version: V500R001C30SPC500 Version: V500R001C30SPC600 Version: V500R001C30SPC600PWE Version: V500R001C30SPC601 Version: V500R001C50SPC009 Version: V500R001C50SPC100 Version: V500R001C50SPC100PWE Version: V500R001C50SPC200 Version: V500R001C50SPC200PWE Version: V500R001C50SPC300 Version: V500R001C60 Version: V500R001C60SPC100PWE Version: V500R001C60SPC200PWE Version: V500R005C00SPC102 Version: V500R001C10 Version: V500R001C10SPC100 Version: V500R001C10SPC200 Version: V500R003C00 Version: V500R003C00SPC100 Version: V200R003C50SPC700 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981", "vendor": "n/a", "versions": [ { "status": "affected", "version": "V200R005C30" }, { "status": "affected", "version": "V200R006C10" }, { "status": "affected", "version": "V200R006C20" }, { "status": "affected", "version": "V200R007C10" }, { "status": "affected", "version": "V200R007C20" }, { "status": "affected", "version": "V200R008C00" }, { "status": "affected", "version": "V200R008C10" }, { "status": "affected", "version": "V200R009C00" }, { "status": "affected", "version": "V500R001C00SPC300" }, { "status": "affected", "version": "V500R001C00SPC500" }, { "status": "affected", "version": "V500R001C00SPH303" }, { "status": "affected", "version": "V500R001C00SPH508" }, { "status": "affected", "version": "V500R001C20" }, { "status": "affected", "version": "V500R001C20SPC100" }, { "status": "affected", "version": "V500R001C20SPC100PWE" }, { "status": "affected", "version": "V500R001C20SPC200" }, { "status": "affected", "version": "V500R001C20SPC200B062" }, { "status": "affected", "version": "V500R001C20SPC200PWE" }, { "status": "affected", "version": "V500R001C20SPC300B078" }, { "status": "affected", "version": "V500R001C20SPC300PWE" }, { "status": "affected", "version": "V500R001C30" }, { "status": "affected", "version": "V500R001C30SPC100" }, { "status": "affected", "version": "V500R001C30SPC100PWE" }, { "status": "affected", "version": "V500R001C30SPC200" }, { "status": "affected", "version": "V500R001C30SPC200PWE" }, { "status": "affected", "version": "V500R001C30SPC300" }, { "status": "affected", "version": "V500R001C50" }, { "status": "affected", "version": "V500R001C50PWE" }, { "status": "affected", "version": "V500R001C80" }, { "status": "affected", "version": "V500R005C00" }, { "status": "affected", "version": "V500R001C00SPC500PWE" }, { "status": "affected", "version": "V500R002C00" }, { "status": "affected", "version": "V500R002C00SPC100" }, { "status": "affected", "version": "V500R002C00SPC100PWE" }, { "status": "affected", "version": "V500R002C00SPC200" }, { "status": "affected", "version": "V500R002C00SPC200PWE" }, { "status": "affected", "version": "V500R002C00SPC300" }, { "status": "affected", "version": "V500R002C10" }, { "status": "affected", "version": "V500R002C10PWE" }, { "status": "affected", "version": "V500R002C30" }, { "status": "affected", "version": "V500R002C30PWE" }, { "status": "affected", "version": "V200R005C03" }, { "status": "affected", "version": "V200R003C00SPC100" }, { "status": "affected", "version": "V500R002C20" }, { "status": "affected", "version": "V500R001C00" }, { "status": "affected", "version": "V500R001C00SPC200" }, { "status": "affected", "version": "V500R001C00SPC600" }, { "status": "affected", "version": "V500R001C00SPC700" }, { "status": "affected", "version": "V500R001C20SPC300" }, { "status": "affected", "version": "V500R001C20SPC500" }, { "status": "affected", "version": "V500R001C20SPC600" }, { "status": "affected", "version": "V500R001C60SPC100" }, { "status": "affected", "version": "V500R001C60SPC101" }, { "status": "affected", "version": "V500R001C60SPC200" }, { "status": "affected", "version": "V500R001C60SPC300" }, { "status": "affected", "version": "V500R001C60SPC500" }, { "status": "affected", "version": "V500R001C60SPC600" }, { "status": "affected", "version": "V500R005C00SPC100" }, { "status": "affected", "version": "V100R001C20SPC100" }, { "status": "affected", "version": "V500R001C20SPC101" }, { "status": "affected", "version": "V500R001C80PWE" }, { "status": "affected", "version": "V100R001C00SPC200" }, { "status": "affected", "version": "V100R001C10SPC200" }, { "status": "affected", "version": "V100R001C10SPC201" }, { "status": "affected", "version": "V100R001C20SPC200" }, { "status": "affected", "version": "V500R001C00SPC050" }, { "status": "affected", "version": "V500R001C00SPC090" }, { "status": "affected", "version": "V500R001C30SPC500" }, { "status": "affected", "version": "V500R001C30SPC600" }, { "status": "affected", "version": "V500R001C30SPC600PWE" }, { "status": "affected", "version": "V500R001C30SPC601" }, { "status": "affected", "version": "V500R001C50SPC009" }, { "status": "affected", "version": "V500R001C50SPC100" }, { "status": "affected", "version": "V500R001C50SPC100PWE" }, { "status": "affected", "version": "V500R001C50SPC200" }, { "status": "affected", "version": "V500R001C50SPC200PWE" }, { "status": "affected", "version": "V500R001C50SPC300" }, { "status": "affected", "version": "V500R001C60" }, { "status": "affected", "version": "V500R001C60SPC100PWE" }, { "status": "affected", "version": "V500R001C60SPC200PWE" }, { "status": "affected", "version": "V500R005C00SPC102" }, { "status": "affected", "version": "V500R001C10" }, { "status": "affected", "version": "V500R001C10SPC100" }, { "status": "affected", "version": "V500R001C10SPC200" }, { "status": "affected", "version": "V500R003C00" }, { "status": "affected", "version": "V500R003C00SPC100" }, { "status": "affected", "version": "V200R003C50SPC700" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T22:51:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981", "version": { "version_data": [ { "version_value": "V200R005C30" }, { "version_value": "V200R006C10" }, { "version_value": "V200R006C20" }, { "version_value": "V200R007C10" }, { "version_value": "V200R007C20" }, { "version_value": "V200R008C00" }, { "version_value": "V200R008C10" }, { "version_value": "V200R009C00" }, { "version_value": "V500R001C00SPC300" }, { "version_value": "V500R001C00SPC500" }, { "version_value": "V500R001C00SPH303" }, { "version_value": "V500R001C00SPH508" }, { "version_value": "V500R001C20" }, { "version_value": "V500R001C20SPC100" }, { "version_value": "V500R001C20SPC100PWE" }, { "version_value": "V500R001C20SPC200" }, { "version_value": "V500R001C20SPC200B062" }, { "version_value": "V500R001C20SPC200PWE" }, { "version_value": "V500R001C20SPC300B078" }, { "version_value": "V500R001C20SPC300PWE" }, { "version_value": "V500R001C30" }, { "version_value": "V500R001C30SPC100" }, { "version_value": "V500R001C30SPC100PWE" }, { "version_value": "V500R001C30SPC200" }, { "version_value": "V500R001C30SPC200PWE" }, { "version_value": "V500R001C30SPC300" }, { "version_value": "V500R001C50" }, { "version_value": "V500R001C50PWE" }, { "version_value": "V500R001C80" }, { "version_value": "V500R005C00" }, { "version_value": "V500R001C00SPC500PWE" }, { "version_value": "V500R002C00" }, { "version_value": "V500R002C00SPC100" }, { "version_value": "V500R002C00SPC100PWE" }, { "version_value": "V500R002C00SPC200" }, { "version_value": "V500R002C00SPC200PWE" }, { "version_value": "V500R002C00SPC300" }, { "version_value": "V500R002C10" }, { "version_value": "V500R002C10PWE" }, { "version_value": "V500R002C30" }, { "version_value": "V500R002C30PWE" }, { "version_value": "V200R005C03" }, { "version_value": "V200R003C00SPC100" }, { "version_value": "V500R002C20" }, { "version_value": "V500R001C00" }, { "version_value": "V500R001C00SPC200" }, { "version_value": "V500R001C00SPC600" }, { "version_value": "V500R001C00SPC700" }, { "version_value": "V500R001C20SPC300" }, { "version_value": "V500R001C20SPC500" }, { "version_value": "V500R001C20SPC600" }, { "version_value": "V500R001C60SPC100" }, { "version_value": "V500R001C60SPC101" }, { "version_value": "V500R001C60SPC200" }, { "version_value": "V500R001C60SPC300" }, { "version_value": "V500R001C60SPC500" }, { "version_value": "V500R001C60SPC600" }, { "version_value": "V500R005C00SPC100" }, { "version_value": "V100R001C20SPC100" }, { "version_value": "V500R001C20SPC101" }, { "version_value": "V500R001C80PWE" }, { "version_value": "V100R001C00SPC200" }, { "version_value": "V100R001C10SPC200" }, { "version_value": "V100R001C10SPC201" }, { "version_value": "V100R001C20SPC200" }, { "version_value": "V500R001C00SPC050" }, { "version_value": "V500R001C00SPC090" }, { "version_value": "V500R001C30SPC500" }, { "version_value": "V500R001C30SPC600" }, { "version_value": "V500R001C30SPC600PWE" }, { "version_value": "V500R001C30SPC601" }, { "version_value": "V500R001C50SPC009" }, { "version_value": "V500R001C50SPC100" }, { "version_value": "V500R001C50SPC100PWE" }, { "version_value": "V500R001C50SPC200" }, { "version_value": "V500R001C50SPC200PWE" }, { "version_value": "V500R001C50SPC300" }, { "version_value": "V500R001C60" }, { "version_value": "V500R001C60SPC100PWE" }, { "version_value": "V500R001C60SPC200PWE" }, { "version_value": "V500R005C00SPC102" }, { "version_value": "V500R001C10" }, { "version_value": "V500R001C10SPC100" }, { "version_value": "V500R001C10SPC200" }, { "version_value": "V500R003C00" }, { "version_value": "V500R003C00SPC100" }, { "version_value": "V200R003C50SPC700" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-ssp-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5254", "datePublished": "2019-12-13T22:51:29", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.